{"id":12493,"date":"2014-11-15T15:19:17","date_gmt":"2014-11-15T14:19:17","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=12493"},"modified":"2021-02-17T15:20:49","modified_gmt":"2021-02-17T14:20:49","slug":"critical-success-factors-for-information-security-programs","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/","title":{"rendered":"Critical Success Factors for Information Security Programs"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12529\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg\" alt=\"\" width=\"881\" height=\"691\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg 881w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme-768x602.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme-223x175.jpg 223w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme-446x350.jpg 446w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme-300x235.jpg 300w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>\u00dc<\/strong><\/em>ver the past two to three years, rapidly increasing cyber threats have put entire business functions, economic sectors, and even countries on alert:<\/p>\n<ul>\n<li>Four years ago, hardly any CFOs\/chief financial officers were talking about cyber risks; today, CFOs\/chief financial officers regularly cite them as one of the most troubling threats1 .<\/li>\n<li>Two years ago, cybersecurity wasn't even a top 10 challenge for energy companies in the US. Today, industry experts rank cybersecurity as one of their four most pressing challenges2 .<\/li>\n<li>Since 2010, the UK has rated cybersecurity as a top priority threat to national security, on a par with terrorism, military conflicts and natural disasters3 . In Switzerland, cyber attacks are included in military planning4 .<\/li>\n<\/ul>\n<p><strong>Backlog demand is recognised<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Organizations whose awareness of the cyber threat has been raised often realize that they have significant catching up to do and that selective remediation is not enough to make up for past failures. In these cases, elaborate information security programs are therefore launched, which are intended to eliminate security gaps sustainably and on a broad front with a portfolio of projects over a period of years. Although such programs are often the right step, their success is highly dependent on the experience of the program management in dealing with them.<\/p>\n<p><strong>Conditions for success<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>This article cannot replace established management methods such as PRINCE2, MSP (Managing Successful Programs), MoP (Management of Portfolios) or the PMI standards, but is only intended to supplement them with regard to the special features of information security programs. For such programs, experience shows that, in addition to the effective use of established management methods, five characteristics of program management in particular are essential for program success:<\/p>\n<ol>\n<li>Strategic thinking<\/li>\n<li>Technical expertise in security and risk matters<\/li>\n<li>Process and organizational thinking<\/li>\n<li>Strong governance and communication skills<\/li>\n<li>Absolute integrity<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>These leadership skills are essential because \"information security\" and \"risk\" affect very broad stakeholders, but at the same time the concepts are quite abstract and \"intangible\" to many people. The leadership team of a security program must therefore be technologically savvy and possess management and communication skills to effectively engage and lead all stakeholders.<\/p>\n<p><strong>The five success factors<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Strategic thinking is important because security programs often start with a general awareness of the problem or a vision. This vision must be translated into a strategy that clearly states what the security vulnerabilities and associated risks are, what solution is required, what the success criteria are, and what the expected costs are. Such a strategy is a prerequisite for receiving a budget. The strategy must also be continuously updated to ensure continuity of the program. Continuity is an important challenge, as security programs often run for several years and must be regularly justified against budget cuts in today's cost environment.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Technical expertise<\/strong> <\/em>The success of a security program does not consist of installing individual tools or technologies. Rather, success lies in sustainably reducing security risks. To do this, a risk-intelligent choice must be made between alternative technologies. Technologies must be configured correctly and they must be embedded in processes that ensure their long-term effectiveness. Since in practice there is no such thing as 100% certainty, program management must continuously weigh alternatives and reach optimal decisions with the various stakeholders - always taking into account the achievable risk reduction, the remaining residual risks and the costs and time involved. This requires significant technical expertise.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Process and organizational thinking<\/strong><\/em> are essential because security measures must be continuously maintained to effectively reduce risk. For example, an intrusion detection system is of little use if its alarms are not monitored and the rules used to detect attacks are not maintained. Organizational thinking is important because security technologies are often implemented globally and an effective solution must take into account the requirements of individual geographies or divisions, such as national law or the autonomy of individual divisions or incompatibilities with established systems.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Strong governance<\/strong><\/em> and strong communication skills are needed because security involves many stakeholders within an organization. This includes various IT departments, security and risk officers, audit, business divisions (whose data is affected and who may also act as sponsors), fraud investigation, the legal department, and data protection officers. In order to make the trade-offs described above with these stakeholders regarding alternative technologies, configurations, or process connections, there needs to be effective governance structures and program leadership that can present technical issues in a comprehensive and understandable manner to drive decisions. In the absence of such governance, programs remain vulnerable when individual stakeholders disagree with decisions. Although this problem is not specific to security programmes, it is particularly pronounced there because of the many stakeholders.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Absolute integrity<\/strong><\/em> is a mandatory requirement for program leadership, as they can influence a great deal of decisions through their strategic work, technical expertise, and communication with diverse stakeholders. Program leadership must therefore be apolitical and at all times aim to do what is in the best interest of the organization.<\/p>\n<p><strong>Conclusion: Use of proven management methods<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Information security programs are increasingly being launched to keep pace with escalating cyber threats. As with all programs, it is important to use proven management methods such as PRINCE2, MSP or MoP. Security programs are unique in some ways, however, in that \"information security\" and \"risk\" affect almost everyone in an organization, yet are abstract and elusive. This is particularly challenging for program managers, especially with regard to the five success factors mentioned above.<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp; \u00dcber die vergangenen zwei bis drei Jahre haben die rasant zunehmenden Cyberbedrohungen ganze Unternehmensfunktionen, Wirtschaftssektoren und sogar L\u00e4nder in Alarmbereitschaft versetzt: Vor vier Jahren sprach kaum ein CFO\/Finanzchef von Cyberrisiken; heute werden sie von CFOs\/ Finanzchefs regelm\u00e4ssig als eine der beunruhigendsten Bedrohungen genannt1 . Vor zwei Jahren war Cybersecurity nicht einmal eine [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[4800],"class_list":["post-12493","post","type-post","status-publish","format-standard","hentry","category-risikomanagement","tag-11-2014"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Umfassende Informationssicherheits-Programme sind oft die richtige L\u00f6sung, um vergangene Vers\u00e4umnisse aufzuholen und Firmen vor Bedrohungen aus dem Cyberspace zu sch\u00fctzen. Um den erwarteten Nutzen zu realisieren und Risiken nachhaltig zu minimieren, ist jedoch Erfahrung in der Leitung solcher Programme unumg\u00e4nglich. Insbesondere spielen f\u00fcnf Erfolgsfaktoren in der Praxis eine entscheidende Rolle.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/critical-success-factors-for-information-security-programs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Umfassende Informationssicherheits-Programme sind oft die richtige L\u00f6sung, um vergangene Vers\u00e4umnisse aufzuholen und Firmen vor Bedrohungen aus dem Cyberspace zu sch\u00fctzen. Um den erwarteten Nutzen zu realisieren und Risiken nachhaltig zu minimieren, ist jedoch Erfahrung in der Leitung solcher Programme unumg\u00e4nglich. Insbesondere spielen f\u00fcnf Erfolgsfaktoren in der Praxis eine entscheidende Rolle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/critical-success-factors-for-information-security-programs\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-15T14:19:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-17T14:20:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg\" \/>\n<meta name=\"author\" content=\"upwork_1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"upwork_1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/\"},\"author\":{\"name\":\"upwork_1\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7\"},\"headline\":\"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme\",\"datePublished\":\"2014-11-15T14:19:17+00:00\",\"dateModified\":\"2021-02-17T14:20:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/\"},\"wordCount\":890,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg\",\"keywords\":[\"11\/2014\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/\",\"url\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/\",\"name\":\"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg\",\"datePublished\":\"2014-11-15T14:19:17+00:00\",\"dateModified\":\"2021-02-17T14:20:49+00:00\",\"description\":\"Umfassende Informationssicherheits-Programme sind oft die richtige L\u00f6sung, um vergangene Vers\u00e4umnisse aufzuholen und Firmen vor Bedrohungen aus dem Cyberspace zu sch\u00fctzen. Um den erwarteten Nutzen zu realisieren und Risiken nachhaltig zu minimieren, ist jedoch Erfahrung in der Leitung solcher Programme unumg\u00e4nglich. Insbesondere spielen f\u00fcnf Erfolgsfaktoren in der Praxis eine entscheidende Rolle.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7\",\"name\":\"upwork_1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g\",\"caption\":\"upwork_1\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/upwork_1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Success Factors for Information Security Programs - MQ Management and Quality","description":"Comprehensive information security programs are often the right solution to make up for past failures and protect companies against threats from cyberspace. However, in order to realize the expected benefits and minimize risks in the long term, experience in managing such programs is essential. In particular, five success factors play a decisive role in practice.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/critical-success-factors-for-information-security-programs\/","og_locale":"en_US","og_type":"article","og_title":"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme - MQ Management und Qualit\u00e4t","og_description":"Umfassende Informationssicherheits-Programme sind oft die richtige L\u00f6sung, um vergangene Vers\u00e4umnisse aufzuholen und Firmen vor Bedrohungen aus dem Cyberspace zu sch\u00fctzen. Um den erwarteten Nutzen zu realisieren und Risiken nachhaltig zu minimieren, ist jedoch Erfahrung in der Leitung solcher Programme unumg\u00e4nglich. Insbesondere spielen f\u00fcnf Erfolgsfaktoren in der Praxis eine entscheidende Rolle.","og_url":"https:\/\/www.m-q.ch\/en\/critical-success-factors-for-information-security-programs\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2014-11-15T14:19:17+00:00","article_modified_time":"2021-02-17T14:20:49+00:00","og_image":[{"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg","type":"","width":"","height":""}],"author":"upwork_1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"upwork_1","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/"},"author":{"name":"upwork_1","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7"},"headline":"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme","datePublished":"2014-11-15T14:19:17+00:00","dateModified":"2021-02-17T14:20:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/"},"wordCount":890,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg","keywords":["11\/2014"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/","url":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/","name":"Critical Success Factors for Information Security Programs - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg","datePublished":"2014-11-15T14:19:17+00:00","dateModified":"2021-02-17T14:20:49+00:00","description":"Comprehensive information security programs are often the right solution to make up for past failures and protect companies against threats from cyberspace. However, in order to realize the expected benefits and minimize risks in the long term, experience in managing such programs is essential. In particular, five success factors play a decisive role in practice.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Kritische-Erfolgsfaktoren-fuer-InformationssicherheitsProgramme.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/kritische-erfolgsfaktoren-fuer-informationssicherheitsprogramme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Kritische Erfolgsfaktoren f\u00fcr InformationssicherheitsProgramme"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7","name":"upwork_1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g","caption":"upwork_1"},"url":"https:\/\/www.m-q.ch\/en\/author\/upwork_1\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/12493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=12493"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/12493\/revisions"}],"predecessor-version":[{"id":12593,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/12493\/revisions\/12593"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=12493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=12493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=12493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}