{"id":16793,"date":"2023-08-24T11:50:36","date_gmt":"2023-08-24T09:50:36","guid":{"rendered":"https:\/\/www.soft-gate.de\/?page_id=16793"},"modified":"2023-10-16T11:39:33","modified_gmt":"2023-10-16T09:39:33","slug":"16793-2","status":"publish","type":"page","link":"https:\/\/www.soft-gate.de\/en\/16793-2\/","title":{"rendered":"Creating a threat and risk analysis"},"content":{"rendered":"<section class=\"l-section wpb_row us_custom_3689c5db height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_boxes stacking_default\" style=\"--additional-gap:1.5rem;\"><div class=\"vc_col-sm-6 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_b5aaf6d0\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_4f24afa8 style_circle align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Bild-2-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Bild-2-300x300.png 300w, https:\/\/www.soft-gate.de\/wp-content\/uploads\/Bild-2-150x150.png 150w, https:\/\/www.soft-gate.de\/wp-content\/uploads\/Bild-2.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/div><div class=\"w-text us_custom_48c8b3f5 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Use case:<\/span><\/span><\/div><div class=\"w-text us_custom_79634cf6 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Creating a threat and risk analysis<\/span><\/span><\/div><div class=\"w-text us_custom_48c8b3f5 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Medizinische Dom\u00e4ne<\/span><\/span><\/div><div class=\"w-text us_custom_a5024b2b has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Endoscopic surgery<\/span><\/span><\/div><div class=\"w-text us_custom_44ba8167 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Technologien:<\/span><\/span><\/div><div class=\"w-text us_custom_a5024b2b has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">\u2022 Threat Modeling (STRIDE)<\/span><\/span><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_0d15be52\"><div class=\"wpb_wrapper\"><h3 class=\"w-text us_custom_e2075630 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Project description<\/span><\/span><\/h3><div class=\"w-separator us_custom_1da3bb4d size_small with_line width_50 thick_1 style_solid color_primary align_center with_content\"><div class=\"w-separator-h\"><i class=\"fas fa-heartbeat\"><\/i><\/div><\/div><div class=\"wpb_text_column us_custom_432d3f53\"><div class=\"wpb_wrapper\"><p>We developed a comprehensive threat and risk analysis for an integration platform deployed within the operating room. Utilizing the STRIDE model, we systematically identified cybersecurity risks and subsequently derived pertinent measures to address the identified vulnerabilities<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_ca103b6a height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\" style=\"--additional-gap:1.5rem;\"><div class=\"vc_col-sm-6 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_0d15be52\"><div class=\"wpb_wrapper\"><h3 class=\"w-text us_custom_c69137a4 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Benefits:<\/span><\/span><\/h3><div class=\"w-separator us_custom_1da3bb4d size_small with_line width_50 thick_1 style_solid color_primary align_center with_content\"><div class=\"w-separator-h\"><i class=\"fas fa-thumbs-up\"><\/i><\/div><\/div><div class=\"wpb_text_column us_custom_8c49d20d\"><div class=\"wpb_wrapper\"><ul>\n<li>Development in accordance to the STRIDE approach<\/li>\n<li>We take care of the Threat and Risk Management<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_0d15be52\"><div class=\"wpb_wrapper\"><h3 class=\"w-text us_custom_c69137a4 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Contact us:<\/span><\/span><\/h3><div class=\"w-separator us_custom_1da3bb4d size_small with_line width_50 thick_1 style_solid color_primary align_center with_content\"><div class=\"w-separator-h\"><i class=\"fas fa-envelope\"><\/i><\/div><\/div><div class=\"wpb_text_column us_custom_1a2ae773\"><div class=\"wpb_wrapper\"><p>It&#8217;s our pleasure to help and advice you if you have any questions regarding our solutions and digifital transformation<\/p>\n<\/div><\/div><div class=\"w-person us_custom_f2eec366 layout_trendy with_socials\" itemscope itemtype=\"https:\/\/schema.org\/Person\"><div class=\"w-person-image\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Niko-Assmann.1x1-2022.png.jpg\" class=\"attachment-full size-full\" alt=\"\" itemprop=\"image\" srcset=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Niko-Assmann.1x1-2022.png.jpg 500w, https:\/\/www.soft-gate.de\/wp-content\/uploads\/Niko-Assmann.1x1-2022.png-300x300.jpg 300w, https:\/\/www.soft-gate.de\/wp-content\/uploads\/Niko-Assmann.1x1-2022.png-150x150.jpg 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><div class=\"img_hover\" style=\"background-image:url(https:\/\/www.soft-gate.de\/wp-content\/uploads\/Niko-Assmann.1x1-2022.png-blackwhite.jpg)\"><\/div><\/div><div class=\"w-person-content\"><h3 itemprop=\"name\" class=\"w-person-name\"><span>Niko Assmann<\/span><\/h3><div class=\"w-person-role\" itemprop=\"jobTitle\">Account Manager<\/div><\/div><div class=\"w-person-content-alt\"><div class=\"w-person-links\"><div class=\"w-person-links-list\"><a href=\"mailto:niko.assmann@soft-gate.de\" class=\"w-person-links-item type_email\" title=\"Email\"><i class=\"fas fa-envelope\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Use case:Creating a threat and risk analysisMedizinische Dom\u00e4neEndoscopic surgeryTechnologien:\u2022 Threat Modeling (STRIDE)Project descriptionWe developed a comprehensive threat and risk analysis for an integration platform deployed within the operating room. Utilizing the STRIDE model, we systematically identified cybersecurity risks and subsequently derived pertinent measures to address the identified vulnerabilities Benefits: Development in accordance to the STRIDE...","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-16793","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages\/16793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/comments?post=16793"}],"version-history":[{"count":4,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages\/16793\/revisions"}],"predecessor-version":[{"id":16797,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages\/16793\/revisions\/16797"}],"wp:attachment":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/media?parent=16793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}