{"id":4754,"date":"2026-02-03T13:28:19","date_gmt":"2026-02-03T12:28:19","guid":{"rendered":"https:\/\/engineering-automation.de\/?p=4754"},"modified":"2026-04-10T11:23:40","modified_gmt":"2026-04-10T09:23:40","slug":"ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act","status":"publish","type":"post","link":"https:\/\/engineering-automation.de\/en\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/","title":{"rendered":"AI-based security engineering for industrial products \u2013 support for small and medium-sized enterprises under the Cyber Resilience Act"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4754\" class=\"elementor elementor-4754\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2bfb74 e-con-full e-flex e-con e-parent\" data-id=\"d2bfb74\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d65030e e-con-full e-flex e-con e-child\" data-id=\"d65030e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f46ac4a elementor-widget elementor-widget-heading\" data-id=\"f46ac4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">News<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bacd973 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"bacd973\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">AI-based security engineering for industrial products \u2013 support for small and medium-sized enterprises under the Cyber Resilience Act<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97ecf29 mdw-horizontal-scroll e-flex e-con-boxed e-con e-parent\" data-id=\"97ecf29\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-adcb977 e-con-full e-flex e-con e-child\" data-id=\"adcb977\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3291b81 e-con-full e-flex e-con e-child\" data-id=\"3291b81\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3edde elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"fb3edde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">news article<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4d872 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5a4d872\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><span style=\"background: #fff\">AI-based security engineering for industrial products \u2013 support for small and medium-sized enterprises under the Cyber Resilience Act<\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f23d54e elementor-widget__width-inherit mdw-reveal-animation-left  animated-slow elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"f23d54e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;flash&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" viewbox=\"0 0 491.31 429.49\"><polygon points=\"48.9 0 0 63.57 138.68 204.34 .63 339.1 57.08 401.2 257.23 204.34 48.9 0\"><\/polygon><rect x=\"195.08\" y=\"353.66\" width=\"296.23\" height=\"75.82\"><\/rect><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33a6932 elementor-widget elementor-widget-text-editor\" data-id=\"33a6932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lemgo. Machines, control systems, and networked industrial products are increasingly becoming the target of cyberattacks. At the same time, the regulatory framework is becoming more stringent: With the European Cyber Resilience Act (CRA) and standards such as IEC 62443, manufacturers must prove that their products are adequately protected throughout their entire life cycle. Many small and medium-sized enterprises (SMEs) are thus facing a double challenge: Their products are often not up to date with the latest security standards, suitable processes are lacking within the company, and specialized security expertise is rare.<\/p>\n<p>This is exactly where the \u201cSRAG\u201d research project of the Fraunhofer Institute IOSB-INA in Lemgo comes in. The project team is developing AI-based building blocks for modern security engineering, i.e. methods, processes, and tools that can be used to develop IT and OT systems that are \u201csecure by design\u201d from the outset. These include secure software development, defense and analysis tools against attacks, and a structured security process across all phases \u2013 from conception to operation.<\/p>\n<p>An AI-supported gap analysis is a key component of this process: based on the current status of products and business processes, the system automatically compares which requirements from the Cyber Resilience Act and standards such as IEC 62443 are already met \u2013 and where specific gaps exist. In addition, other components are being researched, such as support for the design of network segments and zones, firewalls, and identity and access management. Instead of \u201cthe one\u201d approach, this results in a flexible modular system that can be combined depending on the company's initial situation.<\/p>\n<p>Another component of SRAG is the AI-supported threat modeling and risk analysis. Based on product architectures, communication paths, and user roles, the AI identifies typical attack vectors and assesses risks. It suggests appropriate countermeasures - such as hardening industrial control systems, using IDS\/IPS, encryption, or endpoint security. In this process, security engineers remain in control: the AI provides suggestions that are reviewed and adapted by experts and then implemented in security architectures, penetration tests, and code audits.<\/p>\n<p>A particularly important aspect for medium-sized industrial companies is the protection of sensitive data. The AI modules developed in the SRAG project are designed to run locally within the company\u2014for example, directly in the development network or in a secure data center. This means that internal design data, network plans, or log files do not have to be uploaded to an external cloud. Companies retain control over their data and can still use modern AI processes for security engineering, monitoring, and incident response.<\/p>\n<p>With AI-based security engineering, Fraunhofer IOSB-INA aims to enable small and medium-sized enterprises in particular to develop standard-compliant and resilient industrial products \u2013 without having to hire external teams of specialists for every issue. The SRAG project is thus contributing significantly to making industrial value creation in Germany and Europe future-proof and cyber-resilient.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99d2a3e elementor-widget elementor-widget-post-navigation\" data-id=\"99d2a3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/engineering-automation.de\/en\/ki-gestuetzter-programmierassistent-fuer-die-automatisierungsindustrie\/\" rel=\"prev\"><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">previous post<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/engineering-automation.de\/en\/engineering-automation-auf-der-hannover-messe-ki-robotik-und-nachhaltigkeit-in-der-praxis\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">next post<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ca7a7b elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"4ca7a7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/engineering-automation.de\/en\/news-events-generative-ki-in-der-engineering-automation\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Click here for the news articles\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" viewbox=\"0 0 494.13 230.34\"><path d=\"m489.26,102.42l-.37-.39c-2.19-2.32-4.45-4.72-6.77-7.07-6.09-6.17-12.18-12.33-18.28-18.49-7.65-7.73-15.3-15.47-22.94-23.21-6.39-6.48-12.78-12.98-19.16-19.48-6.49-6.61-12.98-13.21-19.48-19.81-.78-.79-1.54-1.59-2.31-2.39-2.4-2.52-4.88-5.12-7.89-7.56-3.2-2.59-7.25-4.02-11.4-4.02-7.89,0-14.91,4.93-17.47,12.26-1.47,4.21-2.75,12.47,5.11,20.44,7.35,7.45,14.7,14.91,22.04,22.37l12.31,12.5c9.45,9.59,18.91,19.18,28.37,28.77-8.95,0-76.99.01-76.99.01-79.46,0-253.57-.01-333.06-.03-1.67,0-3.68.05-5.86.44-5.88,1.05-10.53,4.57-13.02,9.77-1.32,1.76-2.09,3.94-2.09,6.3v3.92c0,1.84.48,3.64,1.4,5.24.05.09.11.18.16.27,3.03,7.3,9.48,11.46,17.85,11.46,27.99-.01,150.61-.02,178.6-.02l233.1-.05-47.26,48.06c-1.69,1.72-3.39,3.43-5.08,5.14-3.77,3.8-7.66,7.72-11.45,11.7-4.42,4.64-6.19,11.05-4.74,17.14,1.32,5.56,5.13,10.16,10.35,12.63,1.74,1.27,3.88,2.01,6.18,2.01h3.67c2.61,0,5.08-.97,6.98-2.65,1.46-.85,2.86-1.94,4.21-3.29,1.51-1.5,3.02-3,4.53-4.5,3.8-3.77,7.73-7.67,11.57-11.58,5.24-5.34,10.48-10.68,15.71-16.03,10.87-11.1,22.11-22.58,33.24-33.76,4.47-4.49,8.94-9.08,13.27-13.52,5.27-5.41,10.72-11.01,16.15-16.39,7.26-7.21,7.64-18.96.83-26.19Zm-8.24,18.73c-9.94,9.87-19.58,20.03-29.46,29.96-16.44,16.51-32.67,33.23-49,49.84-5.29,5.38-10.67,10.67-16.02,16-1,.99-2.1,1.85-3.48,2.25-.41.12-.49.28-.29.62h-3.67c-.03-.55-.5-.53-.85-.65-5.79-2.07-7.56-8.9-3.32-13.36,5.38-5.65,10.94-11.15,16.41-16.72,8.2-8.33,16.4-16.67,24.59-25.01,11.99-12.19,23.98-24.39,35.97-36.58,1.33-1.36,2.68-2.7,4.01-4.04-.3-.42-.67-.33-1.01-.33-74.18.01-148.35.03-222.53.05-39.45,0-173.53,0-212.98.03-4,0-6.9-1.55-8.32-5.44-.13-.36-.38-.68-.58-1.02v-3.92c.6-.04.59-.57.73-.95.97-2.71,2.9-4.27,5.71-4.77,1.34-.24,2.69-.28,4.05-.28,79.47.01,253.57.02,333.03.03,31.67,0,63.35-.02,95.02-.02,1.83,0,3.67.08,5.5.12.38,0,.9.23,1.09-.15.22-.44-.25-.8-.53-1.09-1.96-1.99-3.95-3.95-5.91-5.94-13.02-13.2-26.04-26.41-39.06-39.61-11.45-11.62-22.9-23.26-34.36-34.87-2.69-2.72-3.98-5.8-2.66-9.59,1.73-4.98,8.21-6.87,12.32-3.53,3.4,2.75,6.27,6.06,9.33,9.17,12.9,13.08,25.75,26.2,38.64,39.28,13.72,13.92,27.49,27.79,41.22,41.7,2.36,2.39,4.66,4.84,6.96,7.28,2.97,3.15,2.53,8.42-.59,11.52Z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/engineering-automation.de\/en\/news-events-generative-ki-in-der-engineering-automation\/\" >\n\t\t\t\t\t\t\tClick here for the news articles\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Maschinen, Steuerungen und vernetzte Industrieprodukte geraten zunehmend ins Visier von Cyberangreifern. Gleichzeitig versch\u00e4rft sich der regulatorische Rahmen: Mit dem europ\u00e4ischen Cyber Resilience Act (CRA) und Normen wie IEC 62443 m\u00fcssen Hersteller nachweisen, dass ihre Produkte \u00fcber den gesamten Lebenszyklus hinweg angemessen gesch\u00fctzt sind. <\/p>","protected":false},"author":5,"featured_media":4759,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jowat SE startet unternehmensweite KI-Strategie mit Fraunhofer IEM<\/title>\n<meta name=\"description\" content=\"Jowat SE startet mit Fraunhofer IEM eine KI-Roadmap f\u00fcr strategische KI im industriellen Umfeld.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/engineering-automation.de\/en\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jowat SE startet unternehmensweite KI-Strategie mit Fraunhofer IEM\" \/>\n<meta property=\"og:description\" content=\"Jowat SE startet mit Fraunhofer IEM eine KI-Roadmap f\u00fcr strategische KI im industriellen Umfeld.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/engineering-automation.de\/en\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/\" \/>\n<meta property=\"og:site_name\" content=\"Leistungszentrum Engineering Automation\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-03T12:28:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T09:23:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/engineering-automation.de\/wp-content\/uploads\/Bild-25-1-e1771255682813.png\" \/>\n\t<meta property=\"og:image:width\" content=\"698\" \/>\n\t<meta property=\"og:image:height\" content=\"406\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mischa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mischa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/\"},\"author\":{\"name\":\"Mischa\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#\\\/schema\\\/person\\\/3877e3dd5c7b8ddd872ad97d0adc968a\"},\"headline\":\"KI-basiertes Security Engineering f\u00fcr Industrieprodukte \u2013 Unterst\u00fctzung f\u00fcr den Mittelstand beim Cyber Resilience Act\",\"datePublished\":\"2026-02-03T12:28:19+00:00\",\"dateModified\":\"2026-04-10T09:23:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/\"},\"wordCount\":492,\"publisher\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/engineering-automation.de\\\/wp-content\\\/uploads\\\/Bild-25-1-e1771255682813.png\",\"articleSection\":[\"Allgemein\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/\",\"url\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/\",\"name\":\"Jowat SE startet unternehmensweite KI-Strategie mit Fraunhofer IEM\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/engineering-automation.de\\\/wp-content\\\/uploads\\\/Bild-25-1-e1771255682813.png\",\"datePublished\":\"2026-02-03T12:28:19+00:00\",\"dateModified\":\"2026-04-10T09:23:40+00:00\",\"description\":\"Jowat SE startet mit Fraunhofer IEM eine KI-Roadmap f\u00fcr strategische KI im industriellen Umfeld.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#primaryimage\",\"url\":\"https:\\\/\\\/engineering-automation.de\\\/wp-content\\\/uploads\\\/Bild-25-1-e1771255682813.png\",\"contentUrl\":\"https:\\\/\\\/engineering-automation.de\\\/wp-content\\\/uploads\\\/Bild-25-1-e1771255682813.png\",\"width\":698,\"height\":406,\"caption\":\"Frau betrachtet Netzwerkstecker mit Lupe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/engineering-automation.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KI-basiertes Security Engineering f\u00fcr Industrieprodukte \u2013 Unterst\u00fctzung f\u00fcr den Mittelstand beim Cyber Resilience Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#website\",\"url\":\"https:\\\/\\\/engineering-automation.de\\\/\",\"name\":\"Leistungszentrum Engineering Automation\",\"description\":\"Engineering Automation neu denken \u2013 Innovationen f\u00fcr die Industrie von morgen\",\"publisher\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/engineering-automation.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#organization\",\"name\":\"Leistungszentrum Engineering Automation\",\"url\":\"https:\\\/\\\/engineering-automation.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/engineering-automation.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ENGINEERING-AUTOMATION_LOGO_FINAL.svg\",\"contentUrl\":\"https:\\\/\\\/engineering-automation.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ENGINEERING-AUTOMATION_LOGO_FINAL.svg\",\"width\":814,\"height\":400,\"caption\":\"Leistungszentrum Engineering Automation\"},\"image\":{\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/engineering-automation.de\\\/#\\\/schema\\\/person\\\/3877e3dd5c7b8ddd872ad97d0adc968a\",\"name\":\"Mischa\",\"url\":\"https:\\\/\\\/engineering-automation.de\\\/en\\\/author\\\/mischa\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jowat SE launches company-wide AI strategy with Fraunhofer IEM","description":"Jowat SE startet mit Fraunhofer IEM eine KI-Roadmap f\u00fcr strategische KI im industriellen Umfeld.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/engineering-automation.de\/en\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/","og_locale":"en_GB","og_type":"article","og_title":"Jowat SE startet unternehmensweite KI-Strategie mit Fraunhofer IEM","og_description":"Jowat SE startet mit Fraunhofer IEM eine KI-Roadmap f\u00fcr strategische KI im industriellen Umfeld.","og_url":"https:\/\/engineering-automation.de\/en\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/","og_site_name":"Leistungszentrum Engineering Automation","article_published_time":"2026-02-03T12:28:19+00:00","article_modified_time":"2026-04-10T09:23:40+00:00","og_image":[{"width":698,"height":406,"url":"https:\/\/engineering-automation.de\/wp-content\/uploads\/Bild-25-1-e1771255682813.png","type":"image\/png"}],"author":"Mischa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mischa","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#article","isPartOf":{"@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/"},"author":{"name":"Mischa","@id":"https:\/\/engineering-automation.de\/#\/schema\/person\/3877e3dd5c7b8ddd872ad97d0adc968a"},"headline":"KI-basiertes Security Engineering f\u00fcr Industrieprodukte \u2013 Unterst\u00fctzung f\u00fcr den Mittelstand beim Cyber Resilience Act","datePublished":"2026-02-03T12:28:19+00:00","dateModified":"2026-04-10T09:23:40+00:00","mainEntityOfPage":{"@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/"},"wordCount":492,"publisher":{"@id":"https:\/\/engineering-automation.de\/#organization"},"image":{"@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/engineering-automation.de\/wp-content\/uploads\/Bild-25-1-e1771255682813.png","articleSection":["Allgemein"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/","url":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/","name":"Jowat SE launches company-wide AI strategy with Fraunhofer IEM","isPartOf":{"@id":"https:\/\/engineering-automation.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#primaryimage"},"image":{"@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/engineering-automation.de\/wp-content\/uploads\/Bild-25-1-e1771255682813.png","datePublished":"2026-02-03T12:28:19+00:00","dateModified":"2026-04-10T09:23:40+00:00","description":"Jowat SE startet mit Fraunhofer IEM eine KI-Roadmap f\u00fcr strategische KI im industriellen Umfeld.","breadcrumb":{"@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#primaryimage","url":"https:\/\/engineering-automation.de\/wp-content\/uploads\/Bild-25-1-e1771255682813.png","contentUrl":"https:\/\/engineering-automation.de\/wp-content\/uploads\/Bild-25-1-e1771255682813.png","width":698,"height":406,"caption":"Frau betrachtet Netzwerkstecker mit Lupe"},{"@type":"BreadcrumbList","@id":"https:\/\/engineering-automation.de\/ki-basiertes-security-engineering-fuer-industrieprodukte-unterstuetzung-fuer-den-mittelstand-beim-cyber-resilience-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/engineering-automation.de\/"},{"@type":"ListItem","position":2,"name":"KI-basiertes Security Engineering f\u00fcr Industrieprodukte \u2013 Unterst\u00fctzung f\u00fcr den Mittelstand beim Cyber Resilience Act"}]},{"@type":"WebSite","@id":"https:\/\/engineering-automation.de\/#website","url":"https:\/\/engineering-automation.de\/","name":"Leistungszentrum Engineering Automation","description":"Engineering Automation neu denken \u2013 Innovationen f\u00fcr die Industrie von morgen","publisher":{"@id":"https:\/\/engineering-automation.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/engineering-automation.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/engineering-automation.de\/#organization","name":"Leistungszentrum Engineering Automation","url":"https:\/\/engineering-automation.de\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/engineering-automation.de\/#\/schema\/logo\/image\/","url":"https:\/\/engineering-automation.de\/wp-content\/uploads\/2025\/05\/ENGINEERING-AUTOMATION_LOGO_FINAL.svg","contentUrl":"https:\/\/engineering-automation.de\/wp-content\/uploads\/2025\/05\/ENGINEERING-AUTOMATION_LOGO_FINAL.svg","width":814,"height":400,"caption":"Leistungszentrum Engineering Automation"},"image":{"@id":"https:\/\/engineering-automation.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/engineering-automation.de\/#\/schema\/person\/3877e3dd5c7b8ddd872ad97d0adc968a","name":"Mischa","url":"https:\/\/engineering-automation.de\/en\/author\/mischa\/"}]}},"_links":{"self":[{"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/posts\/4754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/comments?post=4754"}],"version-history":[{"count":14,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/posts\/4754\/revisions"}],"predecessor-version":[{"id":5024,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/posts\/4754\/revisions\/5024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/media\/4759"}],"wp:attachment":[{"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/media?parent=4754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/categories?post=4754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/engineering-automation.de\/en\/wp-json\/wp\/v2\/tags?post=4754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}