Enhance your cybersecurity through advanced threat detection that identifies modern attack methods before they can cause damage. Our tailored solutions combine the latest technologies, threat intelligence, and specialized expertise to detect complex threats at an early stage.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










Modern threat detection should go beyond traditional rule sets and incorporate behavior-based anomaly detection. Our experience shows that sophisticated attacks often only become identifiable through the correlation of seemingly insignificant events. The combination of various detection technologies with continuously updated threat intelligence is critical to detecting even advanced attacks at an early stage.
Years of Experience
Employees
Projects
Implementing effective threat detection requires a structured, risk-based approach that considers both technological and organizational aspects. Our proven methodology ensures that your detection framework is precisely aligned with the most relevant threats and optimally integrated into your existing security processes.
Phase 1: Threat Analysis - Assessment of the specific threat profile and assets requiring protection
Phase 2: Gap Assessment - Analysis of existing detection capabilities and identification of critical gaps
Phase 3: Detection Engineering - Development and implementation of use cases for targeted detection of relevant threats
Phase 4: Operationalization - Integration into SOC processes and development of response workflows
Phase 5: Continuous Improvement - Regular review and adaptation to new threats and technologies
"Effective threat detection is today a decisive factor for a resilient cybersecurity strategy. The ability to identify complex and advanced attacks at an early stage — before they can compromise critical systems or data — dramatically reduces the risk of significant damage. Modern threat detection, however, is far more than just technology: it requires a deep understanding of attack techniques, continuous adaptation, and integration into effective incident response processes."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
Development and implementation of a comprehensive threat detection framework tailored to your specific IT landscape, business requirements, and threat profile. We combine various detection approaches and technologies for maximum coverage and minimal false positives.
Selection, implementation, and optimization of advanced threat detection technologies at the network, endpoint, and cloud level. We ensure the effective use of modern security analytics and monitoring solutions to identify even complex attacks at an early stage.
Integration of current threat intelligence into your threat detection framework for the proactive identification of new and targeted attacks. We ensure the effective use of relevant intelligence sources and their linkage with your detection mechanisms.
Continuous development, refinement, and optimization of your threat detection capabilities. Our detection engineering ensures the systematic improvement of detection use cases, reduction of false positives, and adaptation to new threats.
Looking for a complete overview of all our services?
View Complete Service OverviewDiscover our specialized areas of information security
Threat detection encompasses all processes, technologies, and methods for identifying potential security incidents and malicious activities in IT environments before they can cause significant damage.
*
* Today's attacks are more sophisticated, often tailored, and use advanced techniques to bypass conventional security measures.
*
* Without effective threat detection, attackers remain in compromised networks for an average of over
200 days before being discovered.
*
* The longer an attacker remains undetected, the greater the potential damage through data theft, espionage, sabotage, or lateral movement.
*
* Many compliance frameworks increasingly require proactive threat detection as part of a comprehensive security concept.
*
* Early detection minimizes potential financial losses, reputational damage, and operational impact.
*
* The faster a threat is detected, the faster action can be taken before critical systems or data are compromised.
*
* Continuous monitoring and detection strengthens the overall security maturity of an organization.
*
* Focusing security resources on actual threats rather than false positives.
*
* Development from simple signature-based detection methods to complex behavior- and anomaly-based analyses.
*
* Integration of various data sources and correlation of events across the entire IT landscape.
*
* Shift from pure incident response to proactive threat hunting and continuous monitoring.
*
* Increasing use of machine learning and artificial intelligence to handle large data volumes and complex analysis.
*
* In an era where cyberattacks are becoming increasingly sophisticated and targeted, effective threat detection is no longer optional — it is a fundamental component of every modern cybersecurity strategy. It bridges the gap between preventive security measures and incident response, enabling organizations to detect threats before they escalate into serious security incidents.
Modern threat detection uses various approaches and methods that differ in their functionality, strengths, and areas of application. An effective threat detection framework combines several of these methods to ensure comprehensive coverage.
** -
** -
** -
** -
2 infrastructure.🛠️ **Technologies and Implementation Layers:**
** -
** -
** -
** -
3 bucket misconfiguration, cloud service abuse.
** -
** -
** -
** -
** -
An effective threat detection system consists of several interlocking components that together enable comprehensive and in-depth visibility, analysis, and response capability. These components form an ecosystem that must be continuously developed to keep pace with the evolving threat landscape.🛠️ **Core Technologies and Infrastructure:**
** -
*
* Centralized collection and processing of logs from various sources. -
*
* Network taps, packet capture, NetFlow collectors, network IDS/IPS. -
*
* EDR agents on servers, workstations, and mobile devices.
*
* API monitoring for cloud services and resources.
*
* Data from firewalls, proxies, email gateways, WAFs.
** -
*
* Correlation and analysis of security events. -
*
* Big data analysis for large datasets. -
*
* Detection of complex patterns and anomalies. -
*
* Behavior-based detection mechanisms. -
*
* Integration and management of external threat information.
** -
*
* Real-time overview of the security posture and detections. -
*
* Regular reports for various stakeholders. -
*
* Tools for in-depth analyses and investigations. -
*
* Notifications via various channels.
** -
*
* Systematic development and implementation of detection rules and algorithms. -
*
* Definition, prioritization, and management of specific detection scenarios. -
*
* Regular review of the effectiveness of implemented detection mechanisms. -
*
* Processes for minimizing and managing false alarms.
** -
*
* Prioritization and initial assessment of security alerts. -
*
* Processes for in-depth investigation of potential incidents. -
*
* Seamless transition to incident handling for confirmed threats. -
*
* Continuous improvement based on past detections and investigations.
** -
*
* Integration of new detection methods and indicators. -
*
* Measurement and optimization of detection effectiveness and efficiency. -
*
* Simulated attacks to validate detection capabilities. -
*
* Proactive search for previously undetected threats.
** -
*
* Specialized, paid intelligence from security vendors. -
*
* Open-source intelligence and industry-specific sharing groups. -
*
* Information from government CERT teams and security authorities. -
*
* Reports and findings from security researchers and analysts.
** -
*
* Evaluation of the significance of external intelligence for one's own environment. -
*
* Conversion of intelligence into concrete detection mechanisms. -
*
* Enhancement of security alerts with relevant intelligence. -
*
* Long-term adaptation of the security strategy based on threat trends.
** -
*
* Staff for monitoring, triage, and initial response.
*
* Specialized analysts for proactive threat searching.
*
* Experts in the development and implementation of detection mechanisms. -
*
* Offensive security experts for validating detection capabilities.
** -
*
* Documentation of detection procedures, TTPs, and case studies. -
*
* Education on new attack techniques and detection methods. -
*
* Platforms for teamwork and knowledge sharing. -
*
* Identification and development of required skills within the team.
**
*
* Correlation of detections with known vulnerabilities. -
*
* Integration with IAM systems for context-based analyses. -
*
* Automated responses to detected threats. -
*
* Connection to compliance and risk management processes.
Indicators of Compromise (IOCs) are forensic artifacts, data, or observable events that indicate a potential compromise, an ongoing attack, or malicious activities in a network or system. They represent concrete, identifiable traces left by attackers and are an essential component of modern threat detection and threat intelligence.
** -
*
* Known malicious servers, C
2 infrastructure, botnets. -
*
* Phishing sites, malware distribution sites, C
2 domains. -
*
* Unusual protocols, encrypted communications. -
*
* Suspicious DNS lookups, domain generation algorithms (DGA).
** -
*
* MD5, SHA-1, SHA‑256 hashes of known malware. -
*
* Known storage locations for malware or suspicious files.
*
* Manipulations for persistence, autostart entries. -
*
* Suspicious process names, unusual process hierarchies.
**
**
**
** in standardized formats (STIX, OpenIOC, MISP).
** due to the rapid changeability of many IOCs.
** with relevant threat intelligence information.
** for timely integration into detection mechanisms.
Machine learning (ML) and artificial intelligence (AI) have fundamentally transformed threat detection, enabling a level of effectiveness and efficiency that would not be achievable with traditional methods alone. Their growing importance stems from the increasing complexity of cyber threats and the exponential growth of security data.
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
Endpoint Detection & Response (EDR) and Network Detection & Response (NDR) are complementary technologies for threat detection and response that differ in their focus, detection methods, and specific strengths. A comprehensive security concept combines both approaches for maximum coverage.
** -
*
* Monitors activities on endpoints (workstations, laptops, servers). -
*
* Analyzes network traffic between systems.
** -
*
* Deep visibility at the process, file, and system level. -
*
* Broad visibility at the communication level between systems.
** -
*
* Detects local threats even without network communication. -
*
* Detects network-based threats regardless of endpoint status.
**
*
* Software agents are installed on endpoints. -
*
* Monitors process launches, file system activities, registry changes, memory activities. -
*
* Local and/or centralized analysis of collected data using behavioral analysis and IOC matching. -
*
* Capability for direct isolation, process termination, or system recovery.
** -
*
* Network taps or port mirroring without interfering with data flow. -
*
* Capture of packet data and/or flow information. -
*
* Detection of anomalies, suspicious protocols, and known attack signatures in network traffic. -
*
* Integration with network devices for traffic filtering or segmentation.
** -
** -
** -
** -
** -
** -
** -
** -
** -
*
* Operates in memory without file system access. -
*
* Access to local password stores. -
*
* Abuse of legitimate system processes.
*
* Local exploitation of vulnerabilities. -
*
* Elevation of local permissions.
** -
2 Communication:
*
* Connections to attacker infrastructure. -
*
* Spread between systems in the network. -
*
* Unusual outbound data transfers. -
*
* Scanning and mapping of the network.
*
* Manipulation of network communications.
** -
** -
** -
** -
Threat hunting is a proactive approach in cybersecurity in which specialized security analysts actively search for signs of compromise or malicious activities in networks and systems that have not been detected by automated security solutions. It differs fundamentally from conventional threat detection through its proactive, hypothesis-driven nature.
** -
** -
*
* Theories about possible attack methods and paths based on threat intelligence and experience. -
*
* Targeted investigation of data and systems, rather than passively waiting for alerts. -
*
* Combination of technical tools and critical thinking. -
*
* Continuous refinement of hypotheses and search methods.
**
*
* Reactive — responds to already detected threats and alerts.
*
* Proactive — searches for threats before they trigger alerts.
** -
*
* Alert-based — activity begins after an alarm notification. -
*
* Hypothesis-based — activity begins with a suspicion or assumption.
** -
*
* Known threats with defined signatures or rules. -
*
* Novel, advanced persistent threats (APTs) and zero-day exploits.
** -
*
* Highly automated (SIEM, IDS, EDR). -
*
* Primarily human-driven with tool support.
**
*
* Real-time or near real-time. -
*
* Regular or event-driven campaigns, often more time-intensive.
** -
*
* Defined, standardized processes and playbooks. -
*
* Creative, adaptive approaches based on current threat trends.🛠️ **Threat Hunting Methodology:**
** -
*
* Based on assumptions about attack behavior and TTPs. -
*
* Guided by external threat intelligence on current campaigns. -
*
* Starting from unusual observations not classified as threats. -
*
* Using data analysis to identify patterns or statistical outliers.
** -
*
* Development of a theory based on threat models or intelligence. -
*
* Identification and access to relevant data sources for the investigation. -
*
* Use of analytical methods to identify suspicious activities. -
*
* In-depth analysis of suspicious findings and contextualization. -
*
* Recording of findings, threats, and false positives. -
*
* Integration of results into automated detection systems.
*
* Earlier detection of attackers minimizes potential damage.
*
* Identification of vulnerabilities and security gaps before they are exploited.
*
* Continuous optimization of automatic detection mechanisms.
*
* Deeper insights into one's own IT landscape and threat situation.
*
* Better preparation for novel and targeted attacks.
*
* Combined expertise in security analysis, system understanding, and analytical thinking.
*
* Access to various data sources with sufficient retention periods.
*
* Flexible analysis tools that enable rapid ad-hoc queries and in-depth investigations.
*
* Regular hunting activities as a fixed component of the security strategy.
*
* Current insights into attack techniques and threat actors.
SOAR (Security Orchestration, Automation and Response) refers to a technology category that combines orchestration, automation, and coordinated response to security incidents in an integrated platform. SOAR solutions connect various security tools, standardize workflows, and automate repetitive tasks to improve the efficiency and effectiveness of security operations.
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
Measuring and continuously improving threat detection systems is critical to an effective cybersecurity strategy. A systematic approach with appropriate metrics and optimization processes helps identify weaknesses and steadily advance detection capabilities.
**
*
* Average time from the start of an attack to detection. -
*
* Average time to investigate a detected incident. -
*
* Average time from detection to initiation of countermeasures.
**
*
* Proportion of correctly detected actual threats.
*
* Proportion of incorrectly detected non-threats.
*
* Proportion of undetected actual threats.
** -
*
* Percentage of monitored vs. unmonitored systems. -
*
* Coverage of various attack techniques according to the MITRE ATT&CK framework.
*
* Combined red and blue team exercises to validate detection capabilities.
*
* Automated simulation of common attack techniques.
*
* Proactive search for undetected threats as a validation method.🛠️ **Improvement Strategies:**
** -
** -
**🏆 **Conclusion:**The continuous measurement and improvement of threat detection systems is not a one-time project, but an ongoing process. Successful organizations establish a structured cycle of measurement, analysis, improvement, and validation that is integrated into regular security operations.
Threat intelligence (TI) is a central building block of modern threat detection, bringing context, relevance, and timeliness to detection processes. The strategic use of threat intelligence transforms cybersecurity from a purely reactive to an information-driven, proactive approach.
** -
*
* Broad understanding of the threat landscape and trends.
*
* Information about specific attack methods and techniques.
*
* Specific information on ongoing or imminent campaigns.
*
* Concrete technical indicators and artifacts (IOCs).🛠️ **Integration into Threat Detection:**
** -
** -
** -
**🧩 **Success Factors:**
*
* Focus on threats that are actually relevant to the organization.
*
* Regular updating and removal of outdated intelligence.
*
* Embedding into SOC workflows and playbooks.
*
* Use of sector-specific intelligence sources.
Threat detection in cloud environments differs fundamentally from traditional on-premises approaches. The distributed nature, shared responsibility models, and dynamic characteristics of cloud infrastructures require new strategies and technologies.🌩️ **Fundamental Differences:**
**
*
* Shared responsibility between cloud provider and customer. -
*
* Full control and responsibility for the entire infrastructure.
**
*
* Distributed, often ephemeral resources with abstracted infrastructure. -
*
* Clearly defined network boundaries and physical infrastructure.
**
*
* Multiple layers (IaaS, PaaS, SaaS) with different detection capabilities. -
*
* More uniform control over all infrastructure layers.
*
* Resources are created and deleted automatically and dynamically.
*
* Limited visibility into deeper infrastructure layers.
*
* Enormous quantities of logs and telemetry data from various services.
*
* Diverse services and resource types with different security models.🛠️ **Cloud-specific Threats:**
*
* Theft of API keys and access tokens.
*
* Incorrectly configured S
3 buckets, unsecured databases.
*
* Exploitation of CI/CD pipelines and infrastructure-as-code.
*
* Exploitation of cloud service vulnerabilities.
*
* Detection of misconfigurations and compliance deviations.
*
* Monitoring and protection of VMs, containers, and serverless workloads.
*
* Monitoring of identities and permissions.
*
* API logs, flow logs, and resource logs.
*
* Identity and access management as the primary security boundary.
*
* Behavior-based detection instead of static rules.
*
* Infrastructure-as-code for security controls.
Threat detection is a central building block within a comprehensive security operations (SecOps) process that only reaches its full potential in conjunction with other security functions. Effective integration maximizes the value of detection measures and ensures that identified threats are addressed effectively.
**
*
* Measures to prevent security incidents. -
*
* Identification of threats and security incidents. -
*
* Measures to contain and eliminate detected threats. -
*
* Restoration of normal operating conditions after incidents. -
*
* Continuous optimization based on findings.
** -
** -
** -
** -
*
* Centralized control and monitoring.
*
* Defined handover points from detection to response.
*
* Enrichment of detections with relevant intelligence.
*
* Prioritization based on the actual threat situation.🛠️ **Technical Integration:**
** -
*
* Centralized collection and correlation of all security data. -
*
* Automated workflows from detection to response. -
*
* Unified detection and response across various security domains.
** -
*
* Measurement of the effectiveness of the overall security operations process.
*
* Assessment of detection coverage across various threat types.
*
* Structured evaluation of SecOps maturity.
Sandboxing and dynamic analysis are critical technologies in modern threat detection that make it possible to execute and analyze potentially harmful files and programs in an isolated environment without endangering the actual production system.
** -
** -
** -
** -
*
* Automatic analysis of email attachments and embedded URLs.
*
* Review of downloads and executable web content.
*
* Integration with EDR systems for suspicious files and processes.
*
* Targeted analysis of suspicious artifacts from the environment.⚖️ **Challenges:**
*
* Malware detects and evades analysis environments.
*
* High computational and memory requirements for parallel sandbox environments.
*
* Balance between thorough analysis and real-time requirements.
False positives represent one of the greatest challenges in threat detection. They consume valuable analyst resources, lead to "alert fatigue," and can result in real threats being overlooked.⚠️ **Causes of False Positives:**
** -
** -
** -
** -
** -
*
* Systematic capture and analysis of analyst assessments.
*
* Building a knowledge base on known false positives.
*
* Recording of environment-specific characteristics and exceptions.
Honeypots are specially designed deception systems that appear vulnerable or valuable, but in reality serve as early warning systems and research instruments. In modern threat detection, they have evolved from simple traps to sophisticated deception technologies.
** -
** -
*
* Simulated services with limited functionality. -
*
* Extended simulation with deeper interaction capability. -
*
* Complete systems with real operating systems.
** -
** -
**
*
* Broad strategy with various deception elements.
*
* Fake credentials, prepared documents, API tokens.
*
* Systems specifically designed for cloud environments.
*
* Seamless integration into existing security architectures.
*
* Detection of lateral movement and insider threats.
*
* Creation of own, specific threat data.
*
* Capture of external scanning and attack activities.⚖️ **Challenges:**
*
* Balance between realism and maintainability.
*
* Implications of attacker monitoring in various jurisdictions.
*
* Effort for maintaining and monitoring honeypot systems.
Signature-based and behavior-based detection methods represent two fundamentally different approaches in threat detection, each with complementary strengths and weaknesses. A comprehensive security concept combines both methods for optimal protection.
** -
**
** -
** -
**
** -
**
*
* File-based signatures for known malware. -
*
* Network signatures for known attack patterns. -
*
* Comparison against known indicators of compromise.
** -
*
* Detection of anomalous user behavior. -
*
* Behavior-based network traffic analysis. -
*
* Behavioral monitoring on endpoints. -
*
* Dynamic analysis of the behavior of suspicious objects.
** -
** -
** -
** -
** -
** -
Measuring and continuously improving threat detection is a cyclical process based on meaningful metrics, structured assessments, and targeted optimizations. Successful organizations implement a formal framework for this continuous development.
**
*
* Average time from the start of an attack to detection.
*
* Proportion of correctly detected actual threats.
*
* Proportion of incorrectly detected non-threats.
*
* Proportion of undetected actual threats.
** -
*
* Total number of alerts generated per unit of time. -
*
* Ratio of alerts to confirmed incidents. -
*
* Average number of alerts per analyst.
*
* Simulation of real attack techniques and TTPs of known threat actors.
*
* Collaborative exercises between red team and blue team.
*
* Automated tools for validating security controls.
*
* Proactive search for previously undetected threats.
** -
** -
** -
** -
** -
*
* Prioritization based on real threat scenarios.
*
* Decisions based on quantitative metrics.
*
* Involvement of business, IT, and security teams.
*
* Use of current intelligence for relevant threats.
User and Entity Behavior Analytics (UEBA) has become a key component of modern threat detection, identifying threats through behavior-based anomaly detection that traditional rule-based systems often miss.
** -
** -
*
* Establishment of normal behavior for each entity. -
*
* Ongoing analysis of activities in real time. -
*
* Calculation of deviations from normal behavior.
** -
*
* Detection based on predefined patterns. -
*
* Adaptive detection based on behavioral patterns.
** -
** -
*
* Detection of unusual login times and access patterns.
*
* Identification of abnormal data access and transfers.
*
* Monitoring of administrative activity patterns.
*
* Detection of subtle signs of lateral movement.
*
* Effective against zero-day exploits.
*
* Context-based assessment of anomalies.
*
* Automatic adaptation to changed user behavior.⚖️ **Challenges:**
*
* Integration of various data sources.
*
* High resource requirements for analyses.
*
* Complex explainability of ML-based detections.
*
* Combination with rule-based SIEM detections.
*
* Embedding into existing incident response processes.
*
* UEBA as a component of comprehensive detection and response.
Integrating threat detection into DevOps processes, often referred to as DevSecOps, represents a paradigm shift in which security is treated as an integral part of the entire development and operations lifecycle. This shift "to the left" enables early and continuous detection of security threats.
*
* Moving security measures into early development phases.
*
* Definition of security policies and controls as code.
*
* Joint responsibility for security across all teams.🛠️ **Integration into the DevOps Cycle:**
*
* Threat modeling and security requirements definition.
*
* SAST, dependency scanning, and pre-commit security hooks.
*
* DAST, container and IaC security scanning.
*
* RASP, security gates, and configuration validation.
*
* Runtime detection, behavioral analysis, and continuous assessment.
*
* Security scanners and policy-as-code.
*
* RASP solutions and application-focused WAF.
*
* CSPM, CWPP, and serverless security.
*
* Security dashboards and real-time alerts.
*
* Starting with simple, highly effective security scans.
*
* Maximum automation of detection processes.
*
* Involvement of security champions in development teams.⚖️ **Challenges:**
*
* Optimization of scans and risk-based prioritization.
*
* Implementation of detection solutions for growing environments.
*
* Continuous optimization and contextualization of alerts.
*
* Early integration into the development process.
*
* CI/CD pipeline integration and automated security checks.
*
* Rapid feedback to developers for immediate remediation.
*
* Clear metrics for assessing security maturity and improvement.
*
* Early detection and remediation of vulnerabilities.
*
* Avoidance of costly subsequent security corrections.
*
* Security as an enabler rather than a blocker.
*
* Systematic strengthening of the security posture over time.
The future of threat detection will be shaped by technological innovations, changing threat landscapes, and new defense approaches. As attack techniques continue to evolve, threat detection also continuously adapts to meet these challenges.
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
** -
Discover how we support companies in their digital transformation
Bosch
KI-Prozessoptimierung für bessere Produktionseffizienz

Festo
Intelligente Vernetzung für zukunftsfähige Produktionssysteme

Siemens
Smarte Fertigungslösungen für maximale Wertschöpfung

Klöckner & Co
Digitalisierung im Stahlhandel

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance
Discover our latest articles, expert knowledge and practical guides about Threat Detection
44% der Finanzunternehmen kämpfen mit der DORA-Umsetzung. Erfahren Sie, wo die größten Lücken liegen und welche Maßnahmen jetzt Priorität haben.
44% der Finanzunternehmen kämpfen mit der DORA-Umsetzung. Erfahren Sie, wo die größten Lücken liegen und welche Maßnahmen jetzt Priorität haben.

NIS2, DORA, AI Act und CRA treffen 2026 gleichzeitig. Fristen, Überschneidungen und konkrete Maßnahmen — der komplette Leitfaden für Entscheider.

NIS2, DORA, AI Act und CRA treffen 2026 gleichzeitig. Fristen, Überschneidungen und konkrete Maßnahmen — der komplette Leitfaden für Entscheider.
29.000 Unternehmen müssen sich bis 6. März 2026 beim BSI registrieren. Was bei Versäumnis droht: Bußgelder bis 10 Mio. €, persönliche Geschäftsführer-Haftung und BSI-Aufsichtsmaßnahmen.
NIS2 fordert Risikomanagement für alle ICT-Systeme — inklusive KI. Ab August 2026 kommen die Hochrisiko-Pflichten des EU AI Act dazu. Warum Unternehmen AI Governance jetzt in ihre NIS2-Compliance einbauen müssen.