{"id":1120,"date":"2025-06-30T15:36:10","date_gmt":"2025-06-30T15:36:10","guid":{"rendered":"https:\/\/digital-leaders-hub.de\/?p=1120"},"modified":"2025-07-03T13:19:30","modified_gmt":"2025-07-03T13:19:30","slug":"webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc","status":"publish","type":"post","link":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/","title":{"rendered":"Webinar-Video: Erfolgskriterien &amp; Praxis eines effizienten Security Operations Centers (SOC)."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1120\" class=\"elementor elementor-1120\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-509b97d e-flex e-con-boxed e-con e-parent\" data-id=\"509b97d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9fd5357 e-con-full e-flex e-con e-child\" data-id=\"9fd5357\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-227381d e-con-full e-flex e-con e-child\" data-id=\"227381d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23fa153 elementor-widget elementor-widget-text-editor\" data-id=\"23fa153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span>Praxis &#8211; Video<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c26ea78 elementor-widget elementor-widget-heading\" data-id=\"c26ea78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Webinar-Video: Erfolgskriterien &amp; Praxis eines effizienten Security Operations Centers (SOC).<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd964a3 elementor-widget elementor-widget-text-editor\" data-id=\"fd964a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ein\u00a0Security Operations Center (SOC)\u00a0kann dabei helfen, Cyber-Angriffe fr\u00fchzeitig zu erkennen, Sicherheitsrisiken aktiv zu minimieren und gleichzeitig gesetzliche Vorgaben zuverl\u00e4ssig zu erf\u00fcllen. Doch was braucht es, um ein SOC erfolgreich in die eigene IT-Strategie zu integrieren? Welche technologischen, organisatorischen und rechtlichen Faktoren m\u00fcssen Unternehmen beachten?<\/p><p>Der Stuttgart Airport hat diesen Weg bereits beschritten. Gemeinsam mit Bechtle wurde ein SOC implementiert, das nicht nur moderne Sicherheitsanforderungen erf\u00fcllt, sondern auch als Best Practice f\u00fcr andere Unternehmen dienen kann. Wie wurde das Projekt geplant und umgesetzt? Welche H\u00fcrden mussten \u00fcberwunden werden und welche Ma\u00dfnahmen haben sich als besonders wirkungsvoll erwiesen?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2b0dfd elementor-widget elementor-widget-button\" data-id=\"d2b0dfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Doff_canvas%3Aopen%26settings%3DeyJpZCI6ImIwZGZhZDMiLCJkaXNwbGF5TW9kZSI6Im9wZW4ifQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Downloaden<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0dfad3 elementor-widget elementor-widget-off-canvas\" data-id=\"b0dfad3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"off-canvas.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div id=\"off-canvas-b0dfad3\" class=\"e-off-canvas\" role=\"dialog\" aria-hidden=\"true\" aria-label=\"Formular\" aria-modal=\"true\" inert=\"\" data-delay-child-handlers=\"true\">\n\t\t\t<div class=\"e-off-canvas__overlay\"><\/div>\n\t\t\t<div class=\"e-off-canvas__main\">\n\t\t\t\t<div class=\"e-off-canvas__content\">\n\t\t\t\t\t<div class=\"elementor-element elementor-element-fe0e8b3 e-con-full e-flex e-con e-child\" data-id=\"fe0e8b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8d42238 e-flex e-con-boxed e-con e-child\" data-id=\"8d42238\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8169b1e elementor-widget elementor-widget-heading\" data-id=\"8169b1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Jetzt downloaden<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e248f5d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e248f5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"#elementor-action%3Aaction%3Doff_canvas%3Aclose%26settings%3DeyJpZCI6ImIwZGZhZDMiLCJkaXNwbGF5TW9kZSI6ImNsb3NlIn0%3D\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-times\" viewBox=\"0 0 352 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M242.72 256l100.07-100.07c12.28-12.28 12.28-32.19 0-44.48l-22.24-22.24c-12.28-12.28-32.19-12.28-44.48 0L176 189.28 75.93 89.21c-12.28-12.28-32.19-12.28-44.48 0L9.21 111.45c-12.28 12.28-12.28 32.19 0 44.48L109.28 256 9.21 356.07c-12.28 12.28-12.28 32.19 0 44.48l22.24 22.24c12.28 12.28 32.2 12.28 44.48 0L176 322.72l100.07 100.07c12.28 12.28 32.2 12.28 44.48 0l22.24-22.24c12.28-12.28 12.28-32.19 0-44.48L242.72 256z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48774e5 elementor-widget elementor-widget-shortcode\" data-id=\"48774e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div id=\"evm-form\"><\/div><div id=\"evm-url\" class=\"hide\">https:\/\/evm.digital-leaders-hub.de\/event.php?eh=14d5883f15bbd3614c06&status=teilnehmer&src=WP<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da88fce elementor-hidden-mobile e-flex e-con-boxed e-con e-child\" data-id=\"da88fce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dd0c77 elementor-widget elementor-widget-image\" data-id=\"5dd0c77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"380\" src=\"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/3D_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.png\" class=\"attachment-large size-large wp-image-1141\" alt=\"\" srcset=\"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/3D_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.png 600w, https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/3D_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC-300x190.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-878db69 e-flex e-con-boxed e-con e-parent\" data-id=\"878db69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a5246e3 e-con-full e-flex e-con e-child\" data-id=\"a5246e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce32be7 elementor-widget elementor-widget-text-editor\" data-id=\"ce32be7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In dieser 60-min\u00fctigen Webinar-Aufzeichnung erhalten Sie realistische SOC-Einblicke und konkrete Empfehlungen f\u00fcr Ihre eigene Sicherheitsstrategie. Sie erfahren Wissenswertes \u00fcber die aktuelle Bedrohungslage und Regulatorik, und Sie lernen den Aufbau eines Security Operations Centers in der Praxis kennen. Sie erleben, welche Technologien und Prozesse f\u00fcr eine effektive Cybersicherheit entscheidend sind \u2013 und wie der Weg zu einem funktionierenden SOC aussieht.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc36f2c elementor-widget elementor-widget-heading\" data-id=\"cc36f2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Die Themen und Aspekte in diesem On-Demand-Webinar:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-365dae5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"365dae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybercrime: Bedrohungslage und Regulatorik im Blick<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Aufbau eines Security Operations Centers in der Praxis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Effiziente Ma\u00dfnahmen f\u00fcr zukunftssichere IT-Security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vom Konzept zur Umsetzung \u2013 der Aufbau eines SOC <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29bf63f elementor-widget elementor-widget-text-editor\" data-id=\"29bf63f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>So geht\u2019s:<br>Einfach das Registrierungsformular ausf\u00fcllen und jederzeit dieses informative Video kostenfrei anschauen!<\/p>\n<p><!--EndFragment --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-263c366 elementor-widget elementor-widget-button\" data-id=\"263c366\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Doff_canvas%3Aopen%26settings%3DeyJpZCI6ImIwZGZhZDMiLCJkaXNwbGF5TW9kZSI6Im9wZW4ifQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Downloaden<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.<\/p>\n","protected":false},"author":2,"featured_media":1122,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19],"tags":[20],"class_list":["post-1120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-resilience","tag-praxis-video"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Operations Center (SOC): Erfolgskriterien, Praxis<\/title>\n<meta name=\"description\" content=\"Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Operations Center (SOC): Erfolgskriterien, Praxis\" \/>\n<meta property=\"og:description\" content=\"Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Leaders Hub\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-30T15:36:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T13:19:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Miriam Kuligowski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miriam Kuligowski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/\"},\"author\":{\"name\":\"Miriam Kuligowski\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#\\\/schema\\\/person\\\/71a105a4a0a8d35027849d89be56f89a\"},\"headline\":\"Webinar-Video: Erfolgskriterien &amp; Praxis eines effizienten Security Operations Centers (SOC).\",\"datePublished\":\"2025-06-30T15:36:10+00:00\",\"dateModified\":\"2025-07-03T13:19:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/\"},\"wordCount\":234,\"publisher\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digital-leaders-hub.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg\",\"keywords\":[\"Praxis - Video\"],\"articleSection\":[\"Digital Resilience\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/\",\"url\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/\",\"name\":\"Security Operations Center (SOC): Erfolgskriterien, Praxis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digital-leaders-hub.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg\",\"datePublished\":\"2025-06-30T15:36:10+00:00\",\"dateModified\":\"2025-07-03T13:19:30+00:00\",\"description\":\"Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digital-leaders-hub.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg\",\"contentUrl\":\"https:\\\/\\\/digital-leaders-hub.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/digital-resilience\\\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/digital-leaders-hub.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar-Video: Erfolgskriterien &amp; Praxis eines effizienten Security Operations Centers (SOC).\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#website\",\"url\":\"https:\\\/\\\/digital-leaders-hub.de\\\/\",\"name\":\"Digital Leaders Hub\",\"description\":\"Zukunftssichere IT-Strategien f\u00fcr Entscheider\",\"publisher\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digital-leaders-hub.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#organization\",\"name\":\"Digital Leaders Hub\",\"url\":\"https:\\\/\\\/digital-leaders-hub.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digital-leaders-hub.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Digital_Leaders_Hub_Logo.png\",\"contentUrl\":\"https:\\\/\\\/digital-leaders-hub.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Digital_Leaders_Hub_Logo.png\",\"width\":800,\"height\":160,\"caption\":\"Digital Leaders Hub\"},\"image\":{\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digital-leaders-hub.de\\\/#\\\/schema\\\/person\\\/71a105a4a0a8d35027849d89be56f89a\",\"name\":\"Miriam Kuligowski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f797a9294f5c2df387dc439d903c47977c516f2b8ce0cb8e2c3c512351bbc6fb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f797a9294f5c2df387dc439d903c47977c516f2b8ce0cb8e2c3c512351bbc6fb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f797a9294f5c2df387dc439d903c47977c516f2b8ce0cb8e2c3c512351bbc6fb?s=96&d=mm&r=g\",\"caption\":\"Miriam Kuligowski\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Operations Center (SOC): Erfolgskriterien, Praxis","description":"Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/","og_locale":"de_DE","og_type":"article","og_title":"Security Operations Center (SOC): Erfolgskriterien, Praxis","og_description":"Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.","og_url":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/","og_site_name":"Digital Leaders Hub","article_published_time":"2025-06-30T15:36:10+00:00","article_modified_time":"2025-07-03T13:19:30+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg","type":"image\/jpeg"}],"author":"Miriam Kuligowski","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Miriam Kuligowski","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#article","isPartOf":{"@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/"},"author":{"name":"Miriam Kuligowski","@id":"https:\/\/digital-leaders-hub.de\/#\/schema\/person\/71a105a4a0a8d35027849d89be56f89a"},"headline":"Webinar-Video: Erfolgskriterien &amp; Praxis eines effizienten Security Operations Centers (SOC).","datePublished":"2025-06-30T15:36:10+00:00","dateModified":"2025-07-03T13:19:30+00:00","mainEntityOfPage":{"@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/"},"wordCount":234,"publisher":{"@id":"https:\/\/digital-leaders-hub.de\/#organization"},"image":{"@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg","keywords":["Praxis - Video"],"articleSection":["Digital Resilience"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/","url":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/","name":"Security Operations Center (SOC): Erfolgskriterien, Praxis","isPartOf":{"@id":"https:\/\/digital-leaders-hub.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#primaryimage"},"image":{"@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg","datePublished":"2025-06-30T15:36:10+00:00","dateModified":"2025-07-03T13:19:30+00:00","description":"Wie ein Security Operations Center aufgebaut ist und im Alltag funktioniert und wie der Weg zu einem modernen, abwehrstarken SOC aussieht.","breadcrumb":{"@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#primaryimage","url":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg","contentUrl":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/06\/Beitragsbild_304_Webinar-Video_Erfolgskriterien_und_Praxis_eines_effizienten_Security_Operations_Centers_SOC.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/digital-leaders-hub.de\/digital-resilience\/webinar-video-erfolgskriterien-praxis-eines-effizienten-security-operations-centers-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/digital-leaders-hub.de\/"},{"@type":"ListItem","position":2,"name":"Webinar-Video: Erfolgskriterien &amp; Praxis eines effizienten Security Operations Centers (SOC)."}]},{"@type":"WebSite","@id":"https:\/\/digital-leaders-hub.de\/#website","url":"https:\/\/digital-leaders-hub.de\/","name":"Digital Leaders Hub","description":"Zukunftssichere IT-Strategien f\u00fcr Entscheider","publisher":{"@id":"https:\/\/digital-leaders-hub.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital-leaders-hub.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/digital-leaders-hub.de\/#organization","name":"Digital Leaders Hub","url":"https:\/\/digital-leaders-hub.de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/digital-leaders-hub.de\/#\/schema\/logo\/image\/","url":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/03\/Digital_Leaders_Hub_Logo.png","contentUrl":"https:\/\/digital-leaders-hub.de\/wp-content\/uploads\/2025\/03\/Digital_Leaders_Hub_Logo.png","width":800,"height":160,"caption":"Digital Leaders Hub"},"image":{"@id":"https:\/\/digital-leaders-hub.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/digital-leaders-hub.de\/#\/schema\/person\/71a105a4a0a8d35027849d89be56f89a","name":"Miriam Kuligowski","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f797a9294f5c2df387dc439d903c47977c516f2b8ce0cb8e2c3c512351bbc6fb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f797a9294f5c2df387dc439d903c47977c516f2b8ce0cb8e2c3c512351bbc6fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f797a9294f5c2df387dc439d903c47977c516f2b8ce0cb8e2c3c512351bbc6fb?s=96&d=mm&r=g","caption":"Miriam Kuligowski"}}]}},"_links":{"self":[{"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/posts\/1120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/comments?post=1120"}],"version-history":[{"count":21,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/posts\/1120\/revisions"}],"predecessor-version":[{"id":1214,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/posts\/1120\/revisions\/1214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/media\/1122"}],"wp:attachment":[{"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/media?parent=1120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/categories?post=1120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital-leaders-hub.de\/index.php\/wp-json\/wp\/v2\/tags?post=1120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}