{"id":4588,"date":"2023-11-21T12:57:03","date_gmt":"2023-11-21T10:57:03","guid":{"rendered":"https:\/\/security-robotics.de\/?p=4588"},"modified":"2024-02-05T10:00:03","modified_gmt":"2024-02-05T08:00:03","slug":"analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs","title":{"rendered":"Analytical intelligence and innovations in security management &#8211; the I2SM of the NBS"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;has-divider-edge-bottom-left&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#020003&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/security-<a rel=\"popover\" data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/a>.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png&#8221; alt=&#8221;innovative security concepts from nbs and security <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>&#8221; title_text=&#8221;innovative security concepts from nbs and security <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1320px&#8221; module_alignment=&#8221;center&#8221; max_height=&#8221;600px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"ce_text block\">\n<div class=\"ce_text block\">\n<p style=\"text-align: justify;\">The development and characterisation of modern, above all forward-looking security concepts are significantly influenced by 2 circumstances. On the one hand, there are security-relevant events and, ideally, specifications derived from them for the implementation of measures, as is currently the case for the <strong>KRITIS<\/strong> regulations. Increasing (customer) expectations, in combination with legal requirements, are leading to significantly higher costs in the planning of security scenarios.<\/p>\n<p style=\"text-align: justify;\">On the other hand, we are not only observing rapid technical progress, we are also part of the process ourselves and ensure that key technologies are observed, understood and utilised. Innovations expand the possibilities, areas of application and use cases and allow us to completely rethink security.<\/p>\n<p style=\"text-align: justify;\">And finally, these two &#8211; driving &#8211; forces are also changing the organisation, transforming management processes, which in turn lead to practicable new guidelines and make new certifications definable.<\/p>\n<p style=\"text-align: justify;\">All of these elements are in a constant state of flux, which is why we need bright minds who are aware of this and can pick up and provide impetus. <strong>The Institute for Intelligence and Security Management<\/strong> (<a href=\"https:\/\/www.nbs.de\/forschung\/i2sm\">I2SM<\/a>) was founded in July 2023 for precisely this reason and offers space for theoretical thinking and practical implementation. Security <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">Robotics<\/span> is part of the team, provides impetus for the topics of AI and <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span> and is dedicated to the practical implementation of findings.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Intelligence is THE key word in everything, because it sums up what it&#8217;s all about:<\/strong><\/p>\n<ul>\n<li><strong>Intelligent<\/strong> security concepts that focus on resilience and sustainability, i.e. making the property\/area to be protected resistant to small and large-scale hazards while being scalable and flexible enough to take potential future risks into account<\/li>\n<li><strong>Intelligent<\/strong> security management that enables fast reactions and agile behaviour instead of rigid processes.<\/li>\n<li><strong>Intelligent<\/strong> <a rel=\"popover\" data-title=\"sensor technology\" data-post-id=\"5963\" class=\"sr-glossary-link\" aria-label=\"Sensor technology\" href=\"https:\/\/security-robotics.de\/en\/glossary\/sensor-technology\">sensor technology<\/a> that enables risks to be recognised early and in real time, collects a large amount of data and makes it available to all participants in the security network.<\/li>\n<li><strong>Intelligent <\/strong>security hardware, currently defined by wheeled, walking or flying robots, can carry out typical corporate security tasks independently thanks to their mobility, adaptability and autonomy, i.e. they can also react cleverly to changes on site<\/li>\n<li><strong>Intelligent<\/strong> software systems that utilise all the possibilities of current <a rel=\"popover\" data-title=\"artificial intelligence\" data-post-id=\"6060\" class=\"sr-glossary-link\" aria-label=\"Artificial intelligence\" href=\"https:\/\/security-robotics.de\/en\/glossary\/artificial-intelligence\">artificial intelligence<\/a> take data classification, data use and data evaluation to a completely new level, thus generating clear added value with existing <a rel=\"popover\" data-title=\"security technology\" data-post-id=\"5907\" class=\"sr-glossary-link\" aria-label=\"Security technology\" href=\"https:\/\/security-robotics.de\/en\/glossary\/security-technology\">security technology<\/a> (cameras, motion detectors, anti-theft devices, etc.) and all <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>, insofar as these act as a networked, centrally managed system.<\/li>\n<li><strong>Intelligence<\/strong> in the analysis of incidents, the interdisciplinary use of data and the resulting training concepts for generating expertise among security experts and decision-makers<\/li>\n<li><strong>Intelligence<\/strong> in the above-mentioned aspects makes it possible to continuously analyse, optimise and adapt security processes. This intelligent process analysis is the key to the efficiency and effectiveness of security concepts, as it makes it possible to react flexibly to changing threats and requirements while ensuring that security measures are always up to date. <strong>Intelligence<\/strong> processes support the continuous improvement and adaptation of security processes to ensure the best possible security.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The <strong>I2SM<\/strong> Institute therefore defines itself as a think tank, a source of ideas, which is not just confined to the purely theoretical level, but also constantly scrutinises the practical relevance and innovative strength of its research priorities. The composition of the core team and the choice of cooperation partners confirms close contact with research institutions, the private sector and public bodies, and the many years of experience of many team members in security-related positions guarantees constant practical relevance.<\/p>\n<p style=\"text-align: justify;\">As a software specialist for <span data-title=\"artificial intelligence\" data-post-id=\"6060\" class=\"sr-glossary-link\" aria-label=\"Artificial intelligence\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/artificial-intelligence\">artificial intelligence<\/span> (AI) and an expert in autonomous safety <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>, we are looking forward to the exciting collaboration and close constructive exchange at expert level.<\/p>\n<p>[\/et_pb_text][et_pb_testimonial author=&#8221;Prof. Dr. Andr\u00e9 R\u00f6hl&#8221; job_title=&#8221;Professor of Safety Management at NBS Hamburg&#8221; url=&#8221;https:\/\/www.linkedin.com\/in\/andr%C3%A9-r%C3%B6hl-b9714418b\/&#8221; url_new_window=&#8221;on&#8221; portrait_url=&#8221;https:\/\/security-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.de\/wp-content\/uploads\/2023\/11\/andre-Roehl.jpg&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\"><em>&#8220;The frequency and complexity of current crises require improved approaches to security management. The focus here is on the concept of resilience, which combines the ability of organisations to withstand and cope with crises. Resilience also includes improved information and decision management with regard to identifying, analysing and dealing with risks. Based on the Intelligence Cycle, we at I2SM take a holistic view of the information and decision-making process, from the acquisition of new data through new sensors and sensor carriers, new <a rel=\"popover\" data-title=\"data processing\" data-post-id=\"6155\" class=\"sr-glossary-link\" aria-label=\"Data processing\" href=\"https:\/\/security-robotics.de\/en\/glossary\/data-processing\">data processing<\/a> technologies and new evaluation methods through to application-specific use in security management.&#8221;<\/em><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;rgba(0,0,0,0.24)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;40px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>CONTACT FOR PRESS &amp; COMMUNICATION:<\/h4>\n<p>Michael Engel<\/p>\n<p>E-Mail: <a href=\"mailto:m.engel@security-robotics.de\">m.engel@security-robotics.de<\/a><br\/>\nPhone: <span>+49 341 2569 3369<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221;info@security-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.de&#8221; title=&#8221;Contact us!&#8221; submit_button_text=&#8221;Send&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; module_class=&#8221;with-edge-top-right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;43c21b82-3e69-48bf-9754-a901d779e23f&#8221; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;#000000&#8243; form_field_focus_background_color=&#8221;RGBA(255,255,255,0)&#8221; form_field_focus_text_color=&#8221;#006CA6&#8243; title_font=&#8221;Expletus Sans||||||||&#8221; title_text_color=&#8221;#006CA6&#8243; title_font_size=&#8221;32px&#8221; title_line_height=&#8221;40px&#8221; background_color=&#8221;#FAFAFA&#8221; custom_button=&#8221;on&#8221; custom_padding=&#8221;44px|44px|44px|44px|true|true&#8221; custom_padding_tablet=&#8221;|24px||24px|true|true&#8221; custom_padding_phone=&#8221;|16px||16px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; title_font_size_tablet=&#8221;28px&#8221; title_font_size_phone=&#8221;24px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;20px&#8221; button_text_size_phone=&#8221;18px&#8221; button_text_size_last_edited=&#8221;on|desktop&#8221; custom_css_contact_button=&#8221;margin-top: 24px;&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;rgba(0,0,0,0.16)&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;E-Mail-Adresse&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Phone&#8221; field_title=&#8221;Telefon&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Nachricht&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>The development and characterisation of modern, above all forward-looking security concepts are significantly influenced by 2 circumstances. On the one hand, there are security-relevant events and, ideally, specifications derived from them for the implementation of measures, as is currently the case for the KRITIS regulations. Increasing (customer) expectations, in combination with legal requirements, are leading [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4493,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[23,1],"tags":[],"class_list":["post-4588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles-en","category-unkategorisiert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analytical intelligence and innovations in security management - the I2SM of the NBS - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analytical intelligence and innovations in security management - the I2SM of the NBS\" \/>\n<meta property=\"og:description\" content=\"The development and characterisation of modern, above all forward-looking security concepts are significantly influenced by 2 circumstances. On the one hand, there are security-relevant events and, ideally, specifications derived from them for the implementation of measures, as is currently the case for the KRITIS regulations. Increasing (customer) expectations, in combination with legal requirements, are leading [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-21T10:57:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-05T08:00:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a-1024x649.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"649\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs\",\"url\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs\",\"name\":\"Analytical intelligence and innovations in security management - the I2SM of the NBS - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#primaryimage\"},\"image\":{\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#primaryimage\"},\"thumbnailUrl\":\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png\",\"datePublished\":\"2023-11-21T10:57:03+00:00\",\"dateModified\":\"2024-02-05T08:00:03+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#primaryimage\",\"url\":\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png\",\"contentUrl\":\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png\",\"width\":1920,\"height\":1216,\"caption\":\"innovative security concepts from nbs and security robotics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analytical intelligence and innovations in security management &#8211; the I2SM of the NBS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Analytical intelligence and innovations in security management - the I2SM of the NBS - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs","og_locale":"en_US","og_type":"article","og_title":"Analytical intelligence and innovations in security management - the I2SM of the NBS","og_description":"The development and characterisation of modern, above all forward-looking security concepts are significantly influenced by 2 circumstances. On the one hand, there are security-relevant events and, ideally, specifications derived from them for the implementation of measures, as is currently the case for the KRITIS regulations. Increasing (customer) expectations, in combination with legal requirements, are leading [&hellip;]","og_url":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs","og_site_name":"Security Robotics","article_published_time":"2023-11-21T10:57:03+00:00","article_modified_time":"2024-02-05T08:00:03+00:00","og_image":[{"width":1024,"height":649,"url":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a-1024x649.png","type":"image\/png"}],"author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs","url":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs","name":"Analytical intelligence and innovations in security management - the I2SM of the NBS - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"primaryImageOfPage":{"@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#primaryimage"},"image":{"@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#primaryimage"},"thumbnailUrl":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png","datePublished":"2023-11-21T10:57:03+00:00","dateModified":"2024-02-05T08:00:03+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#primaryimage","url":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png","contentUrl":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/11\/grafik-i2sm_a.png","width":1920,"height":1216,"caption":"innovative security concepts from nbs and security robotics"},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/analytical-intelligence-and-innovations-in-security-management-the-i2sm-of-the-nbs#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Analytical intelligence and innovations in security management &#8211; the I2SM of the NBS"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/4588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=4588"}],"version-history":[{"count":4,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/4588\/revisions"}],"predecessor-version":[{"id":4594,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/4588\/revisions\/4594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media\/4493"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=4588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=4588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=4588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}