{"id":4443,"date":"2019-12-18T10:24:00","date_gmt":"2019-12-18T09:24:00","guid":{"rendered":"https:\/\/web.campus.ese.de\/unkategorisiert\/cybersecurity-control-loops\/"},"modified":"2025-04-08T10:27:09","modified_gmt":"2025-04-08T08:27:09","slug":"cybersecurity-control-loops","status":"publish","type":"post","link":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/","title":{"rendered":"Cybersecurity control system"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity control system<\/h1>\n\n<p><em>Dr.-Ing. Lars Schnieder on the interplay between information security management systems and regulatory oversight in the December issue of the specialist magazine &#8220;Transforming Cities&#8221;<\/em><\/p>\n\n<p>Efficient urban rail systems are the backbone of urban mobility. To protect critical infrastructures, operators of urban rail systems must establish effective information security management systems (ISMS). &#8220;Experience with the processes in the application leads to their continuous improvement. This optimization cycle within the organization is embedded in an overarching control system. IT faults are reported to the supervisory authority. This prevents IT disruptions across organizations or reduces their social impact.&#8221;<\/p>\n\n<p>Are you interested in the entire article by Dr.-Ing. Lars Schnieder and the implementation and measures of technical protection concepts?<\/p>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-25 has-custom-font-size has-small-font-size\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"mailto:pr@ese.de\" style=\"border-radius:0px;background-color:#b5152b\">Request article<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity control system Dr.-Ing. Lars Schnieder on the interplay between information security management systems and regulatory oversight in the December issue of the specialist magazine &#8220;Transforming Cities&#8221; Efficient urban rail systems are the backbone of urban mobility. To protect critical infrastructures, operators of urban rail systems must establish effective information security management systems (ISMS). &#8220;Experience [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[29],"tags":[30],"class_list":["post-4443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-article","tag-technical-article","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity control system<\/title>\n<meta name=\"description\" content=\"In his technical article, Lars Schnieder describes the implementation and measures of technical protection concepts. Learn more \u203a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity control system\" \/>\n<meta property=\"og:description\" content=\"In his technical article, Lars Schnieder describes the implementation and measures of technical protection concepts. Learn more \u203a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/\" \/>\n<meta property=\"og:site_name\" content=\"ESE GmbH - Technology To Trust!\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-18T09:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-08T08:27:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/person\\\/8565fa21de5bb898f9909687b1702c83\"},\"headline\":\"Cybersecurity control system\",\"datePublished\":\"2019-12-18T09:24:00+00:00\",\"dateModified\":\"2025-04-08T08:27:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/\"},\"wordCount\":125,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"keywords\":[\"Technical article\"],\"articleSection\":[\"Technical article\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/\",\"url\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/\",\"name\":\"Cybersecurity control system\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"datePublished\":\"2019-12-18T09:24:00+00:00\",\"dateModified\":\"2025-04-08T08:27:09+00:00\",\"description\":\"In his technical article, Lars Schnieder describes the implementation and measures of technical protection concepts. Learn more \u203a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_stellenangebote_initiativbewerbung.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Quelle: ESE GmbH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/technical-article\\\/cybersecurity-control-loops\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.ese.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity control system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ese.de\\\/en\\\/\",\"name\":\"ESE GmbH\",\"description\":\"Engineering und Software-Entwicklung GmbH\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ese.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#organization\",\"name\":\"ESE GmbH\",\"url\":\"https:\\\/\\\/www.ese.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_logo_transparent.png\",\"contentUrl\":\"https:\\\/\\\/www.ese.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ese_logo_transparent.png\",\"width\":2266,\"height\":782,\"caption\":\"ESE GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.xing.com\\\/pages\\\/eseengineeringundsoftware-entwicklunggmbh\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ese-engineering-und-software-entwicklung-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ese.de\\\/en\\\/#\\\/schema\\\/person\\\/8565fa21de5bb898f9909687b1702c83\",\"name\":\"admin\",\"sameAs\":[\"https:\\\/\\\/www.ese.de\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity control system","description":"In his technical article, Lars Schnieder describes the implementation and measures of technical protection concepts. Learn more \u203a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity control system","og_description":"In his technical article, Lars Schnieder describes the implementation and measures of technical protection concepts. Learn more \u203a","og_url":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/","og_site_name":"ESE GmbH - Technology To Trust!","article_published_time":"2019-12-18T09:24:00+00:00","article_modified_time":"2025-04-08T08:27:09+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#article","isPartOf":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/"},"author":{"name":"admin","@id":"https:\/\/www.ese.de\/en\/#\/schema\/person\/8565fa21de5bb898f9909687b1702c83"},"headline":"Cybersecurity control system","datePublished":"2019-12-18T09:24:00+00:00","dateModified":"2025-04-08T08:27:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/"},"wordCount":125,"publisher":{"@id":"https:\/\/www.ese.de\/en\/#organization"},"image":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","keywords":["Technical article"],"articleSection":["Technical article"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/","url":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/","name":"Cybersecurity control system","isPartOf":{"@id":"https:\/\/www.ese.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#primaryimage"},"image":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","datePublished":"2019-12-18T09:24:00+00:00","dateModified":"2025-04-08T08:27:09+00:00","description":"In his technical article, Lars Schnieder describes the implementation and measures of technical protection concepts. Learn more \u203a","breadcrumb":{"@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#primaryimage","url":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","contentUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_stellenangebote_initiativbewerbung.jpg","width":1920,"height":1280,"caption":"Quelle: ESE GmbH"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ese.de\/en\/technical-article\/cybersecurity-control-loops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.ese.de\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity control system"}]},{"@type":"WebSite","@id":"https:\/\/www.ese.de\/en\/#website","url":"https:\/\/www.ese.de\/en\/","name":"ESE GmbH","description":"Engineering und Software-Entwicklung GmbH","publisher":{"@id":"https:\/\/www.ese.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ese.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ese.de\/en\/#organization","name":"ESE GmbH","url":"https:\/\/www.ese.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ese.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_logo_transparent.png","contentUrl":"https:\/\/www.ese.de\/wp-content\/uploads\/2024\/04\/ese_logo_transparent.png","width":2266,"height":782,"caption":"ESE GmbH"},"image":{"@id":"https:\/\/www.ese.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.xing.com\/pages\/eseengineeringundsoftware-entwicklunggmbh","https:\/\/www.linkedin.com\/company\/ese-engineering-und-software-entwicklung-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.ese.de\/en\/#\/schema\/person\/8565fa21de5bb898f9909687b1702c83","name":"admin","sameAs":["https:\/\/www.ese.de"]}]}},"_links":{"self":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts\/4443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/comments?post=4443"}],"version-history":[{"count":4,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts\/4443\/revisions"}],"predecessor-version":[{"id":4488,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/posts\/4443\/revisions\/4488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/media\/2097"}],"wp:attachment":[{"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/media?parent=4443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/categories?post=4443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ese.de\/en\/wp-json\/wp\/v2\/tags?post=4443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}