{"id":4436,"date":"2020-10-21T10:52:00","date_gmt":"2020-10-21T08:52:00","guid":{"rendered":"https:\/\/web.campus.ese.de\/unkategorisiert\/cybersecurity-management-systems-for-information-security\/"},"modified":"2025-04-08T10:25:02","modified_gmt":"2025-04-08T08:25:02","slug":"cybersecurity-management-systems-for-information-security","status":"publish","type":"post","link":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/","title":{"rendered":"Cybersecurity management systems for information security"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity management systems for information security<\/h1>\n\n<p><em>In the current issue of the trade journal &#8220;Der Eisenbahningenieur&#8221; (10\/2020) an article by Dr.-Ing. habil. Lars Schnieder has been published.<\/em><\/p>\n\n<p>Functioning rail transport is essential for our society. Therefore, railroad considered critical transport infrastructure. The legislator has issued specific regulations on how the railroad is to be protected against unauthorized access by third parties. Railroad undertakings must implement a comprehensive protection concept as a combination of organizational regulations, physical access protection and technical measures. Compliance with organizational measures is usually verified by a certified management system for information security.<\/p>\n\n<p>In his article, Dr.-Ing. habil. Lars Schnieder shows the synergies between a management system for information security and existing regulations of the safety management systems (SMS) of railroad companies. You can read the results of his analysis in the issue of the specialist magazine &#8220;Der Eisenbahningenieur&#8221; (10\/2020).<\/p>\n\n<p>We are happy to provide you with the article free of charge.<\/p>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-25 has-custom-font-size has-small-font-size\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"mailto:pr@ese.de\" style=\"border-radius:0px;background-color:#b5152b\">Request article<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity management systems for information security In the current issue of the trade journal &#8220;Der Eisenbahningenieur&#8221; (10\/2020) an article by Dr.-Ing. habil. Lars Schnieder has been published. Functioning rail transport is essential for our society. Therefore, railroad considered critical transport infrastructure. The legislator has issued specific regulations on how the railroad is to be protected [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[29],"tags":[30],"class_list":["post-4436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-article","tag-technical-article","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity management systems for information security<\/title>\n<meta name=\"description\" content=\"Schnieder on the synergies between the management system for information security and existing regulations of the safety management systems of railroad companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity management systems for information security\" \/>\n<meta property=\"og:description\" content=\"Schnieder on the synergies between the management system for information security and existing regulations of the safety management systems of railroad companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ESE GmbH - Technology To Trust!\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-21T08:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-08T08:25:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/person\\\/8565fa21de5bb898f9909687b1702c83\"},\"headline\":\"Cybersecurity management systems for information security\",\"datePublished\":\"2020-10-21T08:52:00+00:00\",\"dateModified\":\"2025-04-08T08:25:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/\"},\"wordCount\":163,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"keywords\":[\"Technical article\"],\"articleSection\":[\"Technical article\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/\",\"url\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/\",\"name\":\"Cybersecurity management systems for information security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"datePublished\":\"2020-10-21T08:52:00+00:00\",\"dateModified\":\"2025-04-08T08:25:02+00:00\",\"description\":\"Schnieder on the synergies between the management system for information security and existing regulations of the safety management systems of railroad companies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Quelle: ESE GmbH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-management-systems-for-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.ese.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity management systems for information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ese.de\\\/en\\\/\",\"name\":\"ESE GmbH\",\"description\":\"Engineering und Software-Entwicklung GmbH\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ese.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#organization\",\"name\":\"ESE GmbH\",\"url\":\"https:\\\/\\\/www.ese.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_logo_transparent.png\",\"contentUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_logo_transparent.png\",\"width\":2266,\"height\":782,\"caption\":\"ESE GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.xing.com\\\/pages\\\/eseengineeringundsoftware-entwicklunggmbh\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ese-engineering-und-software-entwicklung-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/person\\\/8565fa21de5bb898f9909687b1702c83\",\"name\":\"admin\",\"sameAs\":[\"https:\\\/\\\/www.ese.de\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity management systems for information security","description":"Schnieder on the synergies between the management system for information security and existing regulations of the safety management systems of railroad companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity management systems for information security","og_description":"Schnieder on the synergies between the management system for information security and existing regulations of the safety management systems of railroad companies.","og_url":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/","og_site_name":"ESE GmbH - Technology To Trust!","article_published_time":"2020-10-21T08:52:00+00:00","article_modified_time":"2025-04-08T08:25:02+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#article","isPartOf":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/"},"author":{"name":"admin","@id":"https:\/\/www.ese.de\/en\/#\/schema\/person\/8565fa21de5bb898f9909687b1702c83"},"headline":"Cybersecurity management systems for information security","datePublished":"2020-10-21T08:52:00+00:00","dateModified":"2025-04-08T08:25:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/"},"wordCount":163,"publisher":{"@id":"https:\/\/www.ese.de\/en\/#organization"},"image":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","keywords":["Technical article"],"articleSection":["Technical article"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/","url":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/","name":"Cybersecurity management systems for information security","isPartOf":{"@id":"https:\/\/www.ese.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","datePublished":"2020-10-21T08:52:00+00:00","dateModified":"2025-04-08T08:25:02+00:00","description":"Schnieder on the synergies between the management system for information security and existing regulations of the safety management systems of railroad companies.","breadcrumb":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#primaryimage","url":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","contentUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","width":1920,"height":1280,"caption":"Quelle: ESE GmbH"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-management-systems-for-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.ese.de\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity management systems for information security"}]},{"@type":"WebSite","@id":"https:\/\/www.ese.de\/en\/#website","url":"https:\/\/www.ese.de\/en\/","name":"ESE GmbH","description":"Engineering und Software-Entwicklung GmbH","publisher":{"@id":"https:\/\/www.ese.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ese.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ese.de\/en\/#organization","name":"ESE GmbH","url":"https:\/\/www.ese.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ese.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_logo_transparent.png","contentUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_logo_transparent.png","width":2266,"height":782,"caption":"ESE GmbH"},"image":{"@id":"https:\/\/www.ese.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.xing.com\/pages\/eseengineeringundsoftware-entwicklunggmbh","https:\/\/www.linkedin.com\/company\/ese-engineering-und-software-entwicklung-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.ese.de\/en\/#\/schema\/person\/8565fa21de5bb898f9909687b1702c83","name":"admin","sameAs":["https:\/\/www.ese.de"]}]}},"_links":{"self":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts\/4436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/comments?post=4436"}],"version-history":[{"count":4,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts\/4436\/revisions"}],"predecessor-version":[{"id":4442,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts\/4436\/revisions\/4442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/media\/2097"}],"wp:attachment":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/media?parent=4436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/categories?post=4436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/tags?post=4436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}