{"id":18240,"date":"2026-03-17T08:53:55","date_gmt":"2026-03-17T08:53:55","guid":{"rendered":"https:\/\/www.scheidt.de\/?p=18240"},"modified":"2026-03-17T12:24:31","modified_gmt":"2026-03-17T12:24:31","slug":"from-it-security-incident-to-successful-pentest","status":"publish","type":"post","link":"https:\/\/www.scheidt.de\/en\/vom-it-security-incident-zum-erfolgreichen-pentest\/","title":{"rendered":"From IT security incident to successful pentest: the joint path of Scheidt and SySS"},"content":{"rendered":"<p>At the end of October 2024, Scheidt GmbH &amp; Co. KG fell victim to a hacker attack and had to rebuild its entire systems. The <a href=\"https:\/\/www.syss.de\/\">SySS GmbH <\/a>has supported Scheidt from the outset, first with incident response and then with advice on reconstruction. Finally, SySS Scheidt was able to confirm a good level of security in a major pentest in February 2025.<br>What had happened? And what steps had to be taken along the way? In this interview, Thomas Markloff (IT Forensic Consultant, SySS) and Julian Gruber-Ro\u00ebt (Senior IT Security Consultant, from SySS) look back on the exciting weeks and busy months together with Alejandro von Fersen and Harald Schweitzer from Scheidt IT - and give other companies tips on how they can prevent the worst from happening in an emergency.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.scheidt.de\/wp-content\/uploads\/interviewpartner-1.jpg\" alt=\"From hacker attack to tested security - in just a few months.\" class=\"wp-image-18245\" title=\"\" srcset=\"https:\/\/www.scheidt.de\/wp-content\/uploads\/interviewpartner-1.jpg 1000w, https:\/\/www.scheidt.de\/wp-content\/uploads\/interviewpartner-1-300x200.jpg 300w, https:\/\/www.scheidt.de\/wp-content\/uploads\/interviewpartner-1-768x512.jpg 768w, https:\/\/www.scheidt.de\/wp-content\/uploads\/interviewpartner-1-18x12.jpg 18w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Thomas Markloff (IT Forensic Consultant, SySS) <br>Julian Gruber-Ro\u00ebt (Senior IT Security Consultant, SySS)  <br>Alejandro von Fersen (IT, Scheidt)<br>Harald Schweitzer (IT, Scheidt)<br><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Beginning of November 2024: \u201eThere are certain things you never forget.\u201c<\/h2>\n\n\n\n<p>On the Saturday of a long weekend, the Scheidt IT team led by Alejandro von Fersen and Harald Schweitzer are working on their systems with an external partner to get another system up and running. Suddenly, the remote technician asks: \u201eWhy did you shut down the server?\u201c When the answer is \u201eI didn't.\u201c it quickly becomes clear that there is another party in the network. This can also be seen from the fact that files are apparently being renamed - unwanted and unauthorised. Alejandro von Fersen immediately travelled to the company and disconnected the Internet connection. \u201eThat was peace and quiet for the time being.\u201c However, the entire company was now offline, with all online activities taking place via a mobile phone hotspot.<br>On the same day, he informs Scheidt's management that \u201ewe are the victim of a hacker attack\u201c. Managing Director Georgine Scheidt acted quickly and organised IT forensic experts. She came across SySS through recommendations. Contacting SySS was straightforward and IT forensic consultant Thomas Markloff made an initial appointment possible directly on Sunday.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Early to mid-November 2024: the incident response or: What is a \u201ecar wash\u201c doing here?<\/h2>\n\n\n\n<p>There are many questions at the beginning. Those affected are interested: What is broken? What is available? What is not available? \u201eIt was all written in the stars,\u201c Alejandro and Harald remember.<br>The first thing an incident responder wants to know is what happened: What happened? When did it happen? How did it happen? Who and what is affected? What has been done so far? Thomas uses these questions to gain an initial overview and derive the necessary initial measures. A list of priorities and to-dos is quickly drawn up. Among other things, it includes<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check which backups are available<\/li>\n\n\n\n<li>Set up the car wash<\/li>\n\n\n\n<li>Rotate passwords<\/li>\n\n\n\n<li>Create images<\/li>\n\n\n\n<li>Determine how emergency operation is to be set up<br><\/li>\n<\/ul>\n\n\n\n<p>At the top is also: \u201eBack up what data is still there and available on data storage media.\u201c<br>The encryption process had already started and one system was already fully encrypted. However, the databases containing the company's important information were not encrypted. In retrospect, the work at the weekend was the great fortune of Scheidt GmbH &amp; Co. KG. \u201eWe were fortunate that we were able to access it at all, because we realised it in time. If the attackers had finished, we would never have reached the systems and data,\u201c says Alejandro. And Harald is certain: \u201eIf we had arrived at the company on Monday, it would have been too late.\u201c From his experience as a responder, Thomas can clearly confirm that attackers look very closely at the business hours of their victims. They initially carry out sightings during business hours, and malware is then often rolled out at the weekend. \u201eThe initial attack usually comes on a weekend. Public holidays or holiday periods are very, very popular.\u201c<br>The second day of the incident response is then another working day. Together, Alejandro and Thomas take care of Scheidt's reporting obligations, the notification, the data protection report and provide the relevant information for stakeholder communication.<\/p>\n\n\n\n<p><br>We also buy lots of hard drives. And then comes the car wash. \u201eUnder the guidance of Thomas and his colleagues, we set up a so-called \u201acar wash\u2018 in which the data that we backed up was scanned once to see if anything was compromised or contained macros or other malicious code.\u201c As soon as this has been ruled out, the data can be released and used for recovery.<br>Everything goes very quickly. The car wash is up and running after just one week and is busy scanning. Meanwhile, Scheidt decides to completely rebuild its network. Thomas draws up a specification sheet for a new Active Directory. He is convinced: \u201eAn incident is always an opportunity.\u201c And this is where the next lucky coincidence comes after the weekend work: Scheidt was in the process of reorganising some of the network infrastructure anyway. The attackers were faster, but Scheidt was able to draw on the full resources. \u201eWe had new servers, we had new switches - we had everything we needed. We were able to get started immediately.\u201c By the second week after the security incident, the first servers were up and running in a new, \u201esanitised\u201c network.<br>All of this is planned, supported and reviewed by the SySS responders - initially in daily meetings, then in exchange meetings twice a week and finally in weekly meetings. In the first few weeks, Thomas is available around the clock by phone for Alejandro and his team.<\/p>\n\n\n\n<p><br>The incident response takes about three weeks. When is an incident response actually considered complete? \u201eWhen the customer is back on their own two feet, can complete tasks themselves and no longer requires permanent availability,\u201c explains Thomas.<br>In Scheidt's case, this means that the company is back up and running within four weeks. \u201eWe were able to produce, deliver, send out quotations and order confirmations, write invoices, etc.,\u201a says Mr Scheidt. This was very well received by the customers. The public perception was \u2018We're back\u201c after a very short time!\"<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">End of December 2024 and February 2025: the \u201eemergency pentest\u201c and the \u201ebig pentest\u201c or: \u201eStay awake, boys! Stay awake!\u201c<\/h2>\n\n\n\n<p>Once this point has been reached and the new network has been set up, SySS proposes a kind of \u201eemergency pentest\u201c. The aim is to check whether the newly established network meets current security standards. After all, it should be possible to put it into operation safely. The test will be carried out by SySS consultant Julian Gruber-Ro\u00ebt, who is not yet familiar with the case. Such an emergency pentest is less extensive than a normal test of an internal network. Above all, Julian checks for \u201ethe big errors, i.e. the low-hanging fruits for attackers. These are usually major vulnerabilities with major consequences that are caused by small configuration errors.\u201c In fact, Julian finds just such a vulnerability: an error in the standard configuration of a certification authority that could potentially allow attackers to take over the entire network. For Alejandro, Harald and the others, adjusting the configuration is a small matter - but the security gain and the learning effect are huge.<br>Julian's task is also to evaluate the concept so that Alejandro and his team can make adjustments before everything goes into implementation. Despite the consultation and interim pentest, IT manager Alejandro is still nervous about the subsequent \u201ebig pentest\u201c. \u201eThe biggest enemy is time pressure,\u201c he says. \u201eIt can happen that you do something in a hurry that you couldn't foresee the consequences of.\u201c Just like with the certificates. He is certain that an external perspective provides a perspective that is often lacking internally and shows consequences that you don't see yourself. \u201eWhen you are shown what attackers can do, it can be frightening, but it also opens your eyes to say: \u201aStay awake, guys! Stay awake!\u2018 Scheidt, summarises Alejandro, \u201cwas definitely able to benefit from the pentest, especially because you can still change something. I can't change anything in a real attack. Then it's too late.\u201e<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A year later: \u201eOnce you've had a fall, you realise the advantages of a helmet.\u201c<\/h2>\n\n\n\n<p>During our conversation a year later, we realise that a lot has happened in terms of IT security awareness, especially among employees. Thomas is enthusiastic about the high level of acceptance for strong passwords at Scheidt - he's seen it differently. Harald reports that he still regularly receives enquiries about opening emails and the like. \u201eColleagues are highly sensitive,\u201c he observes.<br>A year later, Scheidt is in a better position than before the incident, both technically and organisationally. When asked what part SySS played in this, Alejandro replies: \u201eWithout the help of SySS, it would certainly have taken us longer. Just the conceptual work, the security considerations and best practices: That would have taken ages. SySS's collaboration was worth its weight in gold.\u201c<\/p>\n\n\n\n<p><a href=\"https:\/\/www.syss.de\/pentest-blog\/vom-it-sicherheitsvorfall-zum-erfolgreichen-pentest-die-scheidt-und-syss-success-story\">To the blog article on syss.de<\/a><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>At the end of October 2024, Scheidt GmbH &amp; Co. KG fell victim to a hacker attack and had to rebuild its entire systems. SySS GmbH supported Scheidt from the outset, first with incident response and then with advice on reconstruction. Finally, in February 2025, SySS was able to confirm Scheidt's good security level in a major pentest.<\/p>","protected":false},"author":4,"featured_media":18244,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[36,38,39],"class_list":["post-18240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-it","tag-pentest","tag-sicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS - Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user<\/title>\n<meta name=\"description\" content=\"\u201eEin Sicherheitsvorfall ist nicht nur Krise \u2013 er ist auch die Chance, IT neu und sicher aufzubauen.\u201c - vom IT Security Incident zum erfolgreichen Pentest\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scheidt.de\/en\/from-it-security-incident-to-successful-pentest\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS - Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user\" \/>\n<meta property=\"og:description\" content=\"\u201eEin Sicherheitsvorfall ist nicht nur Krise \u2013 er ist auch die Chance, IT neu und sicher aufzubauen.\u201c - vom IT Security Incident zum erfolgreichen Pentest\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scheidt.de\/en\/from-it-security-incident-to-successful-pentest\/\" \/>\n<meta property=\"og:site_name\" content=\"Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scheidtgermany\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T08:53:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T12:24:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scheidt.de\/wp-content\/uploads\/syss-bericht-titel1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1918\" \/>\n\t<meta property=\"og:image:height\" content=\"1079\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"s.wendland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"s.wendland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/\"},\"author\":{\"name\":\"s.wendland\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#\\\/schema\\\/person\\\/a6bed6223989ae1cd8c31696c60b7ea1\"},\"headline\":\"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS\",\"datePublished\":\"2026-03-17T08:53:55+00:00\",\"dateModified\":\"2026-03-17T12:24:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/\"},\"wordCount\":1512,\"publisher\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scheidt.de\\\/wp-content\\\/uploads\\\/syss-bericht-titel1.jpg\",\"keywords\":[\"IT\",\"pentest\",\"Sicherheit\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/\",\"url\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/\",\"name\":\"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS - Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scheidt.de\\\/wp-content\\\/uploads\\\/syss-bericht-titel1.jpg\",\"datePublished\":\"2026-03-17T08:53:55+00:00\",\"dateModified\":\"2026-03-17T12:24:31+00:00\",\"description\":\"\u201eEin Sicherheitsvorfall ist nicht nur Krise \u2013 er ist auch die Chance, IT neu und sicher aufzubauen.\u201c - vom IT Security Incident zum erfolgreichen Pentest\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scheidt.de\\\/wp-content\\\/uploads\\\/syss-bericht-titel1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.scheidt.de\\\/wp-content\\\/uploads\\\/syss-bericht-titel1.jpg\",\"width\":1918,\"height\":1079,\"caption\":\"Security Incident, Hackerangriff und L\u00f6sungen -Tipps f\u00fcr andere Unternehmen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/vom-it-security-incident-zum-erfolgreichen-pentest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.scheidt.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#website\",\"url\":\"https:\\\/\\\/www.scheidt.de\\\/\",\"name\":\"Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user\",\"description\":\"Scheidt GmbH &amp; Co. KG - Umschalten auf Zukunft ist kein Slogan, es ist eine Einstellung.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.scheidt.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#organization\",\"name\":\"Scheidt GmbH & Co. KG\",\"url\":\"https:\\\/\\\/www.scheidt.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.scheidt.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Logo-scheidt.svg\",\"contentUrl\":\"https:\\\/\\\/www.scheidt.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Logo-scheidt.svg\",\"width\":566,\"height\":108,\"caption\":\"Scheidt GmbH & Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/scheidtgermany\",\"https:\\\/\\\/www.instagram.com\\\/scheidt_germany\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/scheidt-gmbh-co-kg\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/scheidtgmbh-co-kg\",\"https:\\\/\\\/www.tiktok.com\\\/@scheidtgermany\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.scheidt.de\\\/#\\\/schema\\\/person\\\/a6bed6223989ae1cd8c31696c60b7ea1\",\"name\":\"s.wendland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85507a43bd53f3409981ca19d8b41cf198db6826652da96280f8e27154e7f8cb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85507a43bd53f3409981ca19d8b41cf198db6826652da96280f8e27154e7f8cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85507a43bd53f3409981ca19d8b41cf198db6826652da96280f8e27154e7f8cb?s=96&d=mm&r=g\",\"caption\":\"s.wendland\"},\"url\":\"https:\\\/\\\/www.scheidt.de\\\/en\\\/author\\\/s-wendland\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From IT security incident to successful pentest: the joint path of Scheidt and SySS - transformer stations, compact stations, reinforced concrete supply stations, customised switchgear houses","description":"\u201eA security incident is not just a crisis - it is also an opportunity to rebuild IT securely.\u201c - From IT security incident to successful pentest","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scheidt.de\/en\/from-it-security-incident-to-successful-pentest\/","og_locale":"en_GB","og_type":"article","og_title":"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS - Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user","og_description":"\u201eEin Sicherheitsvorfall ist nicht nur Krise \u2013 er ist auch die Chance, IT neu und sicher aufzubauen.\u201c - vom IT Security Incident zum erfolgreichen Pentest","og_url":"https:\/\/www.scheidt.de\/en\/from-it-security-incident-to-successful-pentest\/","og_site_name":"Trafostationen, Kompaktstationen, Versorgungsstationen aus Stahlbeton, individuelle Schalth\u00e4user","article_publisher":"https:\/\/www.facebook.com\/scheidtgermany","article_published_time":"2026-03-17T08:53:55+00:00","article_modified_time":"2026-03-17T12:24:31+00:00","og_image":[{"width":1918,"height":1079,"url":"https:\/\/www.scheidt.de\/wp-content\/uploads\/syss-bericht-titel1.jpg","type":"image\/jpeg"}],"author":"s.wendland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"s.wendland","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#article","isPartOf":{"@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/"},"author":{"name":"s.wendland","@id":"https:\/\/www.scheidt.de\/#\/schema\/person\/a6bed6223989ae1cd8c31696c60b7ea1"},"headline":"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS","datePublished":"2026-03-17T08:53:55+00:00","dateModified":"2026-03-17T12:24:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/"},"wordCount":1512,"publisher":{"@id":"https:\/\/www.scheidt.de\/#organization"},"image":{"@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scheidt.de\/wp-content\/uploads\/syss-bericht-titel1.jpg","keywords":["IT","pentest","Sicherheit"],"articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/","url":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/","name":"From IT security incident to successful pentest: the joint path of Scheidt and SySS - transformer stations, compact stations, reinforced concrete supply stations, customised switchgear houses","isPartOf":{"@id":"https:\/\/www.scheidt.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#primaryimage"},"image":{"@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scheidt.de\/wp-content\/uploads\/syss-bericht-titel1.jpg","datePublished":"2026-03-17T08:53:55+00:00","dateModified":"2026-03-17T12:24:31+00:00","description":"\u201eA security incident is not just a crisis - it is also an opportunity to rebuild IT securely.\u201c - From IT security incident to successful pentest","breadcrumb":{"@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#primaryimage","url":"https:\/\/www.scheidt.de\/wp-content\/uploads\/syss-bericht-titel1.jpg","contentUrl":"https:\/\/www.scheidt.de\/wp-content\/uploads\/syss-bericht-titel1.jpg","width":1918,"height":1079,"caption":"Security Incident, Hackerangriff und L\u00f6sungen -Tipps f\u00fcr andere Unternehmen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.scheidt.de\/vom-it-security-incident-zum-erfolgreichen-pentest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.scheidt.de\/"},{"@type":"ListItem","position":2,"name":"Vom IT Security Incident zum erfolgreichen Pentest: der gemeinsame Weg von Scheidt und SySS"}]},{"@type":"WebSite","@id":"https:\/\/www.scheidt.de\/#website","url":"https:\/\/www.scheidt.de\/","name":"Transformer stations, compact stations, reinforced concrete supply stations, individual switchgear houses","description":"Scheidt GmbH &amp; Co. KG - Switching to the future is not a slogan, it's an attitude.","publisher":{"@id":"https:\/\/www.scheidt.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scheidt.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.scheidt.de\/#organization","name":"Scheidt GmbH &amp; Co. KG","url":"https:\/\/www.scheidt.de\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.scheidt.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.scheidt.de\/wp-content\/uploads\/2024\/04\/Logo-scheidt.svg","contentUrl":"https:\/\/www.scheidt.de\/wp-content\/uploads\/2024\/04\/Logo-scheidt.svg","width":566,"height":108,"caption":"Scheidt GmbH & Co. KG"},"image":{"@id":"https:\/\/www.scheidt.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/scheidtgermany","https:\/\/www.instagram.com\/scheidt_germany\/","https:\/\/www.linkedin.com\/company\/scheidt-gmbh-co-kg","https:\/\/www.xing.com\/pages\/scheidtgmbh-co-kg","https:\/\/www.tiktok.com\/@scheidtgermany"]},{"@type":"Person","@id":"https:\/\/www.scheidt.de\/#\/schema\/person\/a6bed6223989ae1cd8c31696c60b7ea1","name":"s.wendland","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/85507a43bd53f3409981ca19d8b41cf198db6826652da96280f8e27154e7f8cb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/85507a43bd53f3409981ca19d8b41cf198db6826652da96280f8e27154e7f8cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85507a43bd53f3409981ca19d8b41cf198db6826652da96280f8e27154e7f8cb?s=96&d=mm&r=g","caption":"s.wendland"},"url":"https:\/\/www.scheidt.de\/en\/author\/s-wendland\/"}]}},"_links":{"self":[{"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/posts\/18240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/comments?post=18240"}],"version-history":[{"count":6,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/posts\/18240\/revisions"}],"predecessor-version":[{"id":18258,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/posts\/18240\/revisions\/18258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/media\/18244"}],"wp:attachment":[{"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/media?parent=18240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/categories?post=18240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scheidt.de\/en\/wp-json\/wp\/v2\/tags?post=18240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}