{"id":7704,"date":"2026-03-24T09:00:52","date_gmt":"2026-03-24T09:00:52","guid":{"rendered":"https:\/\/locaterisk.com\/?p=7704"},"modified":"2026-03-25T07:47:41","modified_gmt":"2026-03-25T07:47:41","slug":"it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","title":{"rendered":"Lukas Baumann dans le portrait de CIO Views Magazine"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Rendre l'invisible visible - le magazine CIO Views a fait le portrait de la d\u00e9marche de LocateRisk.<\/h1>\r\n            <p class=\"paragraph\"><br>Les cybermenaces s'annoncent rarement. Elles s'attardent souvent silencieusement dans des vuln\u00e9rabilit\u00e9s n\u00e9glig\u00e9es, des syst\u00e8mes expos\u00e9s ou des actifs num\u00e9riques oubli\u00e9s, jusqu'\u00e0 ce qu'elles soient identifi\u00e9es. Pour Lukas Baumann, CEO de LocateRisk, ce manque de visibilit\u00e9 est l'un des plus grands risques de s\u00e9curit\u00e9 des entreprises modernes. Dans la derni\u00e8re fonctionnalit\u00e9 de la <strong><a href=\"https:\/\/cioviews.com\/lukas-baumann-making-the-invisible-risks-of-the-digital-world-visible\/\" target=\"_blank\" rel=\"noreferrer noopener\">CIO Views<\/a><\/strong> il explique pourquoi une action proactive et des faits techniques doivent constituer la base d'une cybers\u00e9curit\u00e9 solide.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas.png\" alt=\"\" class=\"wp-image-7795\" style=\"object-fit:cover;width:842px;height:auto\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas.png 960w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-300x169.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-768x432.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-18x10.png 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><figcaption class=\"wp-element-caption\">CEO de LocateRisk Lukas Baumann et son \u00e9quipe<\/figcaption><\/figure><\/div>\n\n\n<p>Les approches traditionnelles de la s\u00e9curit\u00e9 se concentrent souvent sur les contr\u00f4les internes et la conformit\u00e9. Mais elles n\u00e9gligent souvent l'aspect de leur propre infrastructure du point de vue d'un attaquant externe. Lukas Baumann a pour objectif de rendre ces risques cach\u00e9s mesurables et de minimiser les risques de mani\u00e8re pr\u00e9ventive. Gr\u00e2ce \u00e0 l'automatisation et \u00e0 l'\u00e9volutivit\u00e9, la cybers\u00e9curit\u00e9 passe ainsi d'un processus r\u00e9actif \u00e0 un processus proactif.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>EASM : contr\u00f4ler les surfaces d'attaque externes gr\u00e2ce \u00e0 l'automatisation<\/strong><\/strong><\/h3>\n\n\n\n<p> Le manque de visibilit\u00e9 sur sa propre surface d'attaque est l'une des principales faiblesses de nombreuses organisations. LocateRisk permet d'\u00e9valuer et de surveiller facilement sa propre infrastructure informatique externe gr\u00e2ce \u00e0 une surveillance continue des risques informatiques.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatisation<\/strong>: Les audits r\u00e9currents fournissent une image continue de l'exposition num\u00e9rique.<\/li>\n\n\n\n<li><strong>Pr\u00e9cision<\/strong>: Au lieu de mod\u00e8les th\u00e9oriques, l'accent est mis sur les faits techniques.<\/li>\n\n\n\n<li><strong>\u00c9volutivit\u00e9<\/strong>Les solutions fonctionnent dans tous les secteurs pour les organisations de toutes tailles.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Efficacit\u00e9 : Gain de temps gr\u00e2ce aux flux de travail bas\u00e9s sur l'IA<\/strong><\/strong><\/h3>\n\n\n\n<p> Dans le domaine de la cybers\u00e9curit\u00e9, la vitesse est un facteur d\u00e9cisif pour limiter ou \u00e9viter les dommages. LocateRisk utilise la technologie pour acc\u00e9l\u00e9rer les processus de d\u00e9cision.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Int\u00e9gration de l'IA<\/strong>L'intelligence artificielle est int\u00e9gr\u00e9e dans les processus quotidiens jusqu'\u00e0 ce qu'elle devienne la norme.<\/li>\n\n\n\n<li><strong>D\u00e9charge<\/strong>: Les analyses automatis\u00e9es aident les \u00e9quipes \u00e0 traiter les informations plus rapidement, sans les surcharger.<\/li>\n\n\n\n<li><strong>Orientation vers les processus<\/strong>L'expertise est directement int\u00e9gr\u00e9e dans les processus et ne d\u00e9pend pas de personnes individuelles.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Vendor Risk Management : s\u00e9curit\u00e9 dans l'ensemble de l'\u00e9cosyst\u00e8me des partenaires<\/strong><\/strong><\/h3>\n\n\n\n<p>La s\u00e9curit\u00e9 d'une entreprise ne s'arr\u00eate pas aux fronti\u00e8res de son propre r\u00e9seau, mais inclut les partenaires commerciaux et les fournisseurs.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Surveillance des tiers<\/strong>: une visibilit\u00e9 continue sur la situation des fournisseurs en mati\u00e8re de s\u00e9curit\u00e9 r\u00e9duit les risques \u00e0 travers la cha\u00eene d'approvisionnement.<\/li>\n\n\n\n<li><strong>Orientation de l'action<\/strong>: Des outils sont mis \u00e0 disposition pour s'attaquer directement aux vuln\u00e9rabilit\u00e9s identifi\u00e9es. \u2192 En savoir plus sur le <a href=\"https:\/\/locaterisk.com\/fr\/landing\/vendor-risk-management-leicht-gemacht\/\" type=\"link\" id=\"https:\/\/www.locaterisk.com\/de\/easm\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gestion des risques fournisseurs - VRM<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>La standardisation rencontre des recommandations d'action concr\u00e8tes<\/strong><\/h3>\n\n\n\n<p>L'analyse individuelle de la s\u00e9curit\u00e9 informatique n'est qu'un instantan\u00e9. Lukas Baumann souligne que seul un contr\u00f4le continu et la correction des lacunes constat\u00e9es apportent un gain de s\u00e9curit\u00e9 mesurable.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Standardisation<\/strong>L'objectif est d'\u00e9tablir un standard pour les notations de s\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong>Focalisation sur les r\u00e9sultats<\/strong>: La plateforme filtre les informations non pertinentes et fournit des approches concr\u00e8tes pour r\u00e9soudre les probl\u00e8mes. \u2192 En savoir plus sur<a href=\"https:\/\/www.google.com\/search?q=https:\/\/www.locaterisk.com\/de\/it-risikomanagement\/\"> <\/a><a href=\"https:\/\/locaterisk.com\/fr\/landing\/it-risikoanalyse\/\" type=\"link\" id=\"https:\/\/www.locaterisk.com\/de\/it-risikomanagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">l'analyse des risques informatiques et le monitoring de LocateRisk<\/a><\/li>\n<\/ul>\n\n\n\n<p><span style=\"display:inline-flex; align-items:center;\"><br><img decoding=\"async\" class=\"wp-image-6345\" style=\"width: 150px; margin-right: 12px;\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Award-Logo-CIO-Views.png\" alt=\"\"><br>    <span style=\"display:inline-block;\"><strong>Lien vers l'article dans CIO Views<\/strong><br><a href=\"https:\/\/cioviews.com\/lukas-baumann-making-the-invisible-risks-of-the-digital-world-visible\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lukas Baumann : Rendre visibles les risques invisibles du monde num\u00e9rique<\/a><br>    <\/span><br>  <\/span><\/p>\n\n\n\n<div class=\"wp-block-lr-faq-module\"><div class=\"content\"><h3><strong>FAQ technique : <strong>Gestion des surfaces d'attaque externes<\/strong><\/strong><\/h3><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Pourquoi la vision externe de la s\u00e9curit\u00e9 informatique est-elle cruciale ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Les contr\u00f4les internes ne saisissent souvent pas \u00e0 quoi ressemble l'infrastructure pour les attaquants. Une analyse externe r\u00e9v\u00e8le les actifs expos\u00e9s et les syst\u00e8mes oubli\u00e9s qui repr\u00e9sentent un risque pour la s\u00e9curit\u00e9.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Comment l'automatisation am\u00e9liore-t-elle les processus de cybers\u00e9curit\u00e9 ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">L'automatisation permet des analyses \u00e9volutives et r\u00e9currentes qui r\u00e9agissent plus rapidement aux changements que les audits manuels. Cela permet de soulager les \u00e9quipes et de garantir que l'expertise est appliqu\u00e9e de mani\u00e8re coh\u00e9rente.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Quel est le r\u00f4le de l'IA dans l'acc\u00e9l\u00e9ration du processus de s\u00e9curit\u00e9 informatique ?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Gr\u00e2ce au MCP-\ud835\udde6\ud835\uddf0\ud835\uddf5\ud835\uddfb\ud835\uddf6\ud835\ude01\ud835\ude01\ud835\ude00\ud835\ude01\ud835\uddf2\ud835\uddf9\ud835\uddf9\ud835\uddf2 (Model Context Protocol), les entreprises peuvent acc\u00e9der aux donn\u00e9es d'analyse et aux fonctions de filtrage dans la plateforme via leurs mod\u00e8les d'IA pr\u00e9f\u00e9r\u00e9s. Cela permet de r\u00e9duire au minimum le d\u00e9lai entre la d\u00e9tection et la r\u00e9solution.<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Rendre l'invisible visible - c'est ce qui nous motive chez LocateRisk GmbH. Lukas Baumann dans le portrait de CIO Views Magazine.<\/p>","protected":false},"author":17,"featured_media":7870,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[95,103,94,18,92,97,98,91,100,4,8,88,44,69,93,102,89,90,96,99,101],"class_list":["post-7704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-automatisierter-scan-vergleich-it-sicherheit","tag-cio-views","tag-cyber-vendor-risk-management","tag-cybersecurity","tag-easm","tag-easm-tool-mit-mcp-support","tag-effizienzsteigerung-it-security-analyst","tag-external-attack-surface-management","tag-it-risikoanalyse","tag-it-sicherheit","tag-it-sicherheitsanalysen","tag-ki-native-sicherheitsanalyse","tag-lieferanten-risikomanagement","tag-lieferantenbewertung","tag-locaterisk","tag-lukas-baumann","tag-mcp-schnittstelle","tag-model-context-protocol","tag-sicherheits-reporting-automatisieren-ki","tag-supply-chain-risk-management-nis-2","tag-vendor-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lukas Baumann im CIO Views Magazine Portrait - LocateRisk<\/title>\n<meta name=\"description\" content=\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T09:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T07:47:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png\" \/>\n\t<meta property=\"og:image:width\" content=\"635\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"},\"author\":{\"name\":\"Shaima Luc\u00eda El Qaouti\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\"},\"headline\":\"Lukas Baumann im CIO Views Magazine Portrait\",\"datePublished\":\"2026-03-24T09:00:52+00:00\",\"dateModified\":\"2026-03-25T07:47:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"},\"wordCount\":674,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"keywords\":[\"Automatisierter Scan-Vergleich IT-Sicherheit\",\"CIO Views\",\"Cyber Vendor Risk Management\",\"Cybersecurity\",\"EASM\",\"EASM Tool mit MCP-Support\",\"Effizienzsteigerung IT-Security-Analyst\",\"External Attack Surface Management\",\"IT-Risikoanalyse\",\"IT-Sicherheit\",\"IT-Sicherheitsanalysen\",\"KI-native Sicherheitsanalyse\",\"Lieferanten-Risikomanagement\",\"Lieferantenbewertung\",\"LocateRisk\",\"Lukas Baumann\",\"MCP-Schnittstelle\",\"Model Context Protocol\",\"Sicherheits-Reporting automatisieren KI\",\"Supply Chain Risk Management NIS-2\",\"Vendor Risk Management\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\",\"name\":\"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"datePublished\":\"2026-03-24T09:00:52+00:00\",\"dateModified\":\"2026-03-25T07:47:41+00:00\",\"description\":\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"width\":635,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lukas Baumann im CIO Views Magazine Portrait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\",\"name\":\"Shaima Luc\u00eda El Qaouti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"caption\":\"Shaima Luc\u00eda El Qaouti\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","og_locale":"fr_FR","og_type":"article","og_title":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","og_description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","og_url":"https:\/\/locaterisk.com\/fr\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","og_site_name":"LocateRisk","article_published_time":"2026-03-24T09:00:52+00:00","article_modified_time":"2026-03-25T07:47:41+00:00","og_image":[{"width":635,"height":500,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","type":"image\/png"}],"author":"Shaima Luc\u00eda El Qaouti","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Shaima Luc\u00eda El Qaouti","Dur\u00e9e de lecture estim\u00e9e":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"},"author":{"name":"Shaima Luc\u00eda El Qaouti","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7"},"headline":"Lukas Baumann im CIO Views Magazine Portrait","datePublished":"2026-03-24T09:00:52+00:00","dateModified":"2026-03-25T07:47:41+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"},"wordCount":674,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","keywords":["Automatisierter Scan-Vergleich IT-Sicherheit","CIO Views","Cyber Vendor Risk Management","Cybersecurity","EASM","EASM Tool mit MCP-Support","Effizienzsteigerung IT-Security-Analyst","External Attack Surface Management","IT-Risikoanalyse","IT-Sicherheit","IT-Sicherheitsanalysen","KI-native Sicherheitsanalyse","Lieferanten-Risikomanagement","Lieferantenbewertung","LocateRisk","Lukas Baumann","MCP-Schnittstelle","Model Context Protocol","Sicherheits-Reporting automatisieren KI","Supply Chain Risk Management NIS-2","Vendor Risk Management"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","url":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","name":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","datePublished":"2026-03-24T09:00:52+00:00","dateModified":"2026-03-25T07:47:41+00:00","description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","width":635,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Lukas Baumann im CIO Views Magazine Portrait"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7","name":"Shaima Luc\u00eda El Qaouti","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","caption":"Shaima Luc\u00eda El Qaouti"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/7704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=7704"}],"version-history":[{"count":51,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/7704\/revisions"}],"predecessor-version":[{"id":7869,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/7704\/revisions\/7869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/7870"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=7704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=7704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=7704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}