{"id":16664,"date":"2025-01-20T11:05:52","date_gmt":"2025-01-20T10:05:52","guid":{"rendered":"https:\/\/www.robin-data.io\/?p=16664"},"modified":"2025-03-28T14:09:44","modified_gmt":"2025-03-28T13:09:44","slug":"internal-control-assessment-2","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2","title":{"rendered":"Continuous Auditing &amp; Monitoring"},"content":{"rendered":"<div  class='flex_column av-6kd3hhc-f210d8e5670c4cb7b18b66478d4e24f6 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div'     ><p><section  class='av_textblock_section av-lati8klg-df702c5e62672e1537553135294c3e62'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Continuous Auditing &amp; Continuous Monitoring<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-66vichs-8e3eaa568866145f682a5b07eeb9b021\">\n.avia-image-container.av-66vichs-8e3eaa568866145f682a5b07eeb9b021 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-66vichs-8e3eaa568866145f682a5b07eeb9b021 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-66vichs-8e3eaa568866145f682a5b07eeb9b021 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" loading=\"lazy\" class='wp-image-15509 avia-img-lazy-loading-15509 avia_image' src=\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg\" alt='Continuous Auditing und Continuous Monitoring bieten Organisationen zahlreiche Vorteile, wie eine verbesserte Risikomanagement, eine h\u00f6here Effizienz und eine bessere Compliance.' title='Continuous auditing and continuous monitoring'  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg 685w, https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management-300x150.jpg 300w, https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management-18x9.jpg 18w\" sizes=\"auto, (max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n<div  class='hr av-5qtkvkw-410af83d638c329078749686c01f2314 hr-default  avia-builder-el-3  el_after_av_image  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-579ysv4-31121d3b04c9b6a015a5f014d025cbf5\">\n#top .av-special-heading.av-579ysv4-31121d3b04c9b6a015a5f014d025cbf5{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-579ysv4-31121d3b04c9b6a015a5f014d025cbf5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-579ysv4-31121d3b04c9b6a015a5f014d025cbf5 .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-579ysv4-31121d3b04c9b6a015a5f014d025cbf5 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-579ysv4-31121d3b04c9b6a015a5f014d025cbf5 av-special-heading-h1 custom-color-heading  avia-builder-el-4  el_after_av_hr  el_before_av_hr'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Continuous auditing and continuous monitoring<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lf6r8za7-8c6f9c6ec4c065713c89d1769ff1d702\">\n#top .hr.hr-invisible.av-lf6r8za7-8c6f9c6ec4c065713c89d1769ff1d702{\nheight:24px;\n}\n<\/style>\n<div  class='hr av-lf6r8za7-8c6f9c6ec4c065713c89d1769ff1d702 hr-invisible  avia-builder-el-5  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-4f1falc-043d77d7df3d75eac536b820187017e4'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Continuous Auditing und Continuous Monitoring bieten Organisationen zahlreiche Vorteile, wie eine verbesserte Risikomanagement, eine h\u00f6here Effizienz und eine bessere Compliance. Allerdings sind auch einige Herausforderungen zu bew\u00e4ltigen. Organisationen sollten sorgf\u00e4ltig planen und die richtigen Technologien ausw\u00e4hlen, um von den Vorteilen dieser Ans\u00e4tze profitieren zu k\u00f6nnen.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lchmt9o6-f81509c4b69641cbfe4f3a1c0e8560d9\">\n#top .av-special-heading.av-lchmt9o6-f81509c4b69641cbfe4f3a1c0e8560d9{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lchmt9o6-f81509c4b69641cbfe4f3a1c0e8560d9 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lchmt9o6-f81509c4b69641cbfe4f3a1c0e8560d9 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lchmt9o6-f81509c4b69641cbfe4f3a1c0e8560d9 av-special-heading-h2 blockquote modern-quote  avia-builder-el-7  el_after_av_textblock  el_before_av_textblock'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Key information on continuous auditing and continuous monitoring<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lchnro6e-870e37f8b8bc8705508f33f6a670411a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li><strong>Continuous Auditing<\/strong> ist ein ein datengetriebener, automatisierter Pr\u00fcfprozess der Daten in Echtzeit oder in kurzen Intervallen \u00fcberpr\u00fcft, um Risiken fr\u00fchzeitig zu erkennen und die Pr\u00fcfungsqualit\u00e4t zu steigern<\/li>\n<li><strong>Continuous monitoring<\/strong> ist ein fortlaufender \u00dcberwachungsprozess, der kritische Gesch\u00e4ftsprozesse, IT-Systeme und Risiken kontinuierlich \u00fcberwacht, um Abweichungen, Sicherheitsvorf\u00e4lle oder Regelverst\u00f6\u00dfe sofort zu identifizieren.<\/li>\n<li>The <strong>Vorteile in der Verwendung beider Ans\u00e4tze<\/strong> ist h\u00f6here Effizienz und Transparenz, fr\u00fchzeitige Erkennung von Risiken und Schwachstellen, sowie die M\u00f6glichkeit, Compliance-Anforderungen und Sicherheitsstandards in Echtzeit zu gew\u00e4hrleisten.<\/li>\n<li>CA und CM werden durch k\u00fcnstliche Intelligenz unterst\u00fctzt, dabei bleibt <strong>People at the centre of the decision-making process despite automation<\/strong>. Die KI entlastet durch die \u00dcbernahme repetitiver, datenintensiver Aufgaben, doch die finale Entscheidung liegt beim Menschen.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n<div class='flex_column_table av-lchmhnod-f1b341c3ad251cf840e6a90a1f1df7e7 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lchmhnod-f1b341c3ad251cf840e6a90a1f1df7e7\">\n.flex_column.av-lchmhnod-f1b341c3ad251cf840e6a90a1f1df7e7{\npadding:25px 25px 25px 25px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-lchmhnod-f1b341c3ad251cf840e6a90a1f1df7e7 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-top  column-top-margin'     ><section  class='av_textblock_section av-kiipug5e-71d2c8f0de795210673e2f91b4232926'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Content on the topic of continuous auditing and continuous monitoring:<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8\">\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon{\ncolor:#127db3;\nfont-size:20px;\n}\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon svg:first-child{\nstroke:#127db3;\nfill:#127db3;\nheight:20px;\nwidth:20px;\n}\n#top #wrap_all .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .av_iconlist_title{\nfont-size:20px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8  avia-builder-el-11  el_after_av_textblock  el_before_av_hr'><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 avia-iconlist-animate'>\n<li><div class='iconlist_icon av-7jdvf-2-2-1-1-11-9-2-2-13-a84b48d9d2d292a09b086fd6a948340a avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#ca-cm-definition&#039; title=&#039;What are continuous auditing and continuous monitoring?&#039;&gt;What are continuous auditing and continuous monitoring?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#ca-cm-definition' title='What are continuous auditing and continuous monitoring?'>What are continuous auditing and continuous monitoring?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-2-2-1-1-11-9-cc73268601170335d2280587988fee87 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#ca-cm-bedeutung&#039; title=&#039;Die Bedeutung von Continuous Auditing und Monitoring f&uuml;r Unternehmen&#039;&gt;Die Bedeutung von Continuous Auditing und Monitoring f&uuml;r Unternehmen&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#ca-cm-bedeutung' title='Die Bedeutung von Continuous Auditing und Monitoring f\u00fcr Unternehmen'>Die Bedeutung von Continuous Auditing und Monitoring f\u00fcr Unternehmen<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li><a href=\"#ca-cm-bedeutung\">Advantages of continuous auditing in internal auditing<\/a><\/li>\n<li><a href=\"#ca-cm-bedeutung\">Continuous Monitoring f\u00fcr Governance, Risk und Compliance (GRC)<\/a><\/li>\n<li><a href=\"#ca-cm-bedeutung\">Herausforderungen bei der Implementierung beider Ans\u00e4tze<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-2-2-1-1-11-abe2c639b369d531a982fbfc44fb1785 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#ca-cm-einsatzgebiete&#039; title=&#039;Areas of application for continuous auditing and monitoring&#039;&gt;Areas of application for continuous auditing and monitoring&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#ca-cm-einsatzgebiete' title='Areas of application for continuous auditing and monitoring'>Areas of application for continuous auditing and monitoring<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li><a href=\"#ca-cm-einsatzgebiete\">Application examples in internal auditing<\/a><\/li>\n<li><a href=\"#ca-cm-einsatzgebiete\">Efficient control of processes through continuous monitoring<\/a><\/li>\n<li><a href=\"#ca-cm-einsatzgebiete\">\u00dcberwachung und Sicherheit in IT-Systemen<\/a><\/li>\n<li><a href=\"#ca-cm-einsatzgebiete\">Compliance with industry standards<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-2-3-1-653d69cb508e1fc86bca8b6f840eccc3 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#ca-cm-methoden-tools&#039; title=&#039;Methoden und Tools f&uuml;r Continuous Auditing und Monitoring&#039;&gt;Methoden und Tools f&uuml;r Continuous Auditing und Monitoring&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#ca-cm-methoden-tools' title='Methoden und Tools f\u00fcr Continuous Auditing und Monitoring'>Methoden und Tools f\u00fcr Continuous Auditing und Monitoring<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li><a href=\"#ca-cm-methoden-tools\">Automation through AI and data analytics<\/a><\/li>\n<li><a href=\"#ca-cm-methoden-tools\">Softwarel\u00f6sungen f\u00fcr Continuous Auditing<\/a><\/li>\n<li><a href=\"#ca-cm-methoden-tools\">Tools f\u00fcr kontinuierliches Monitoring von Daten und Prozessen<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-2-2-1-1-11-9-2-42dbd0836776eba41a780b7414d3b790 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#mensch-als-entscheider&#039; title=&#039;The role of humans in AI-driven auditing and monitoring&#039;&gt;The role of humans in AI-driven auditing and monitoring&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#mensch-als-entscheider' title='The role of humans in AI-driven auditing and monitoring'>The role of humans in AI-driven auditing and monitoring<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-2-2-1-1-11-9-2-2-13-7-3-1-3-c72dd6edd58ad8f112a0cb8157c79f64 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#fazit&#039; title=&#039;Conclusion&#039;&gt;Conclusion&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#fazit' title='Conclusion'>Conclusion<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa\">\n#top .hr.hr-invisible.av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa hr-invisible  avia-builder-el-12  el_after_av_iconlist  avia-builder-el-last'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<div  id=\"ca-cm-definition\"  class='flex_column av-2i4z6x3-9d593fb69f9884323abce671c124b8e7 av_one_full  avia-builder-el-13  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yw2x3b-68dcbfabf433aebdd6ca38cce8b1e3e0\">\n#top .av-special-heading.av-1yw2x3b-68dcbfabf433aebdd6ca38cce8b1e3e0{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1yw2x3b-68dcbfabf433aebdd6ca38cce8b1e3e0 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1yw2x3b-68dcbfabf433aebdd6ca38cce8b1e3e0 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"audit-management\"  class='av-special-heading av-1yw2x3b-68dcbfabf433aebdd6ca38cce8b1e3e0 av-special-heading-h2 blockquote modern-quote  avia-builder-el-14  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What are continuous auditing and continuous monitoring?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-21mfqk8-89c68215aad89d91db44b47bdd7c6c80'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In der heutigen, schnelllebigen Gesch\u00e4ftswelt, in der sich Compliance-Anforderungen st\u00e4ndig ver\u00e4ndern, sind traditionelle Pr\u00fcfungsmethoden oft nicht mehr ausreichend. Um Organisationen dabei zu unterst\u00fctzen, u.a. Risiken proaktiv zu managen und Compliance sicherzustellen, haben sich zwei Konzepte etabliert: Continuous Auditing und Continuous Monitoring. Der <strong>Differences between continuous auditing and continuous monitoring<\/strong> ist der Bereich, mit dem sich beide Methoden befassen. W\u00e4hrend <strong>Continuous Auditing<\/strong> sich in erster Linie auf die Pr\u00fcfung der Wirksamkeit von internen Kontrollsystemen konzentriert, umfasst <strong>Continuous monitoring<\/strong> einen breiteren Bereich. Continuous Monitoring beinhaltet neben der Pr\u00fcfung auch die \u00dcberwachung von Prozessen, Risiken und Compliance.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4r02pmm-3a65c8629483277e17498b2f86d2697d\">\n.avia-image-container.av-m4r02pmm-3a65c8629483277e17498b2f86d2697d img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-m4r02pmm-3a65c8629483277e17498b2f86d2697d .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-m4r02pmm-3a65c8629483277e17498b2f86d2697d av-styling- avia-align-center  avia-builder-el-16  el_after_av_textblock  el_before_av_heading'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" loading=\"lazy\" class='wp-image-16734 avia-img-lazy-loading-16734 avia_image' src=\"https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-1030x774.png\" alt='Presentation of the difference between continuous auditing and continuous monitoring' title='Difference between continuous auditing and continuous monitoring'  height=\"774\" width=\"1030\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-1030x774.png 1030w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-300x225.png 300w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-768x577.png 768w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-1536x1154.png 1536w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-2048x1538.png 2048w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-16x12.png 16w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-1500x1127.png 1500w, https:\/\/media.robin-data.io\/2025\/01\/20095340\/Unterschied-Continuos-Auditing-Continuos-Monitoring-705x529.png 705w\" sizes=\"auto, (max-width: 1030px) 100vw, 1030px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jncs7a-189895f7fce26f6a72a21edcb14d9e8c\">\n#top .av-special-heading.av-m4jncs7a-189895f7fce26f6a72a21edcb14d9e8c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jncs7a-189895f7fce26f6a72a21edcb14d9e8c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jncs7a-189895f7fce26f6a72a21edcb14d9e8c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"audit-management\"  class='av-special-heading av-m4jncs7a-189895f7fce26f6a72a21edcb14d9e8c av-special-heading-h3 blockquote modern-quote  avia-builder-el-17  el_after_av_image  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Definition of Continuous Auditing<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-4i6u1k-2ebe9bab5ca68ec0af99c79bae1359fd'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Continuous Auditing (kontinuierliche Pr\u00fcfung) bezeichnet eine Pr\u00fcfungsmethode, bei der Pr\u00fcfungen nicht mehr in festen Intervallen durchgef\u00fchrt werden, sondern kontinuierlich und in Echtzeit. Dabei werden Daten aus verschiedenen Systemen und Quellen gesammelt und analysiert, um potenzielle Risiken und Abweichungen fr\u00fchzeitig zu erkennen. Das Ziel ist es, ein laufendes Pr\u00fcfungsurteil \u00fcber die Wirksamkeit der internen Kontrollsysteme zu erhalten.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jnd9s7-160b1ae6a9f1684fbd06046323fcc531\">\n#top .av-special-heading.av-m4jnd9s7-160b1ae6a9f1684fbd06046323fcc531{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jnd9s7-160b1ae6a9f1684fbd06046323fcc531 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jnd9s7-160b1ae6a9f1684fbd06046323fcc531 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"audit-management\"  class='av-special-heading av-m4jnd9s7-160b1ae6a9f1684fbd06046323fcc531 av-special-heading-h3 blockquote modern-quote  avia-builder-el-19  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Definition of Continuous Monitoring<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-nqb8s8-e23420d479a8cc72b174e33616224436'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Continuous Monitoring (kontinuierliche \u00dcberwachung) ist ein umfassenderer Ansatz, der nicht nur die Pr\u00fcfung, sondern auch die \u00dcberwachung von Prozessen, Risiken und Compliance beinhaltet. Dabei werden Daten aus verschiedenen Quellen in Echtzeit gesammelt und analysiert, um Abweichungen von den definierten Zielen oder Schwellenwerten zu erkennen. Continuous Monitoring erm\u00f6glicht es Organisationen, proaktiv auf Ver\u00e4nderungen zu reagieren und Risiken zu minimieren.<\/p>\n<\/div><\/section><\/p><\/div>\n<div  id=\"ca-cm-bedeutung\"  class='flex_column av-4i43srr-45ea4a1815816c8df3a197baa344334c av_one_full  avia-builder-el-21  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m0w80ewr-4e2c1677a1ca75dc1b32e88b0894ebb3\">\n#top .av-special-heading.av-m0w80ewr-4e2c1677a1ca75dc1b32e88b0894ebb3{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m0w80ewr-4e2c1677a1ca75dc1b32e88b0894ebb3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m0w80ewr-4e2c1677a1ca75dc1b32e88b0894ebb3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-m0w80ewr-4e2c1677a1ca75dc1b32e88b0894ebb3 av-special-heading-h2 blockquote modern-quote  avia-builder-el-22  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Die Bedeutung von Continuous Auditing und Monitoring f\u00fcr Organisationen<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-3z6kwlj-b5b5e3302450856ddb3af523f0dbc62c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Continuous Auditing and Continuous Monitoring have a transformative effect on the way organisations manage risk and ensure compliance. They offer a proactive and data-driven approach that helps organisations achieve their goals and secure competitive advantage.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-39q6i9z-a500f4afffb0490256612d22a74138f8\">\n#top .av-special-heading.av-39q6i9z-a500f4afffb0490256612d22a74138f8{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-39q6i9z-a500f4afffb0490256612d22a74138f8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-39q6i9z-a500f4afffb0490256612d22a74138f8 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-39q6i9z-a500f4afffb0490256612d22a74138f8 av-special-heading-h3 blockquote modern-quote  avia-builder-el-24  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Advantages of continuous auditing in internal auditing<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-365xqkn-8a3fcfce6a2483266417addb8e43b971'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li><strong>Fr\u00fchzeitige Erkennung von Risiken:<\/strong> Durch die kontinuierliche Analyse von Daten k\u00f6nnen potenzielle Risiken und Abweichungen fr\u00fchzeitig identifiziert werden, bevor sie zu gr\u00f6\u00dferen Problemen eskalieren.<\/li>\n<li><strong>Efficiency enhancement:<\/strong> Die Automatisierung von Pr\u00fcfungsprozessen f\u00fchrt zu erheblichen Zeit- und Kosteneinsparungen.<\/li>\n<li><strong>Verbesserte Qualit\u00e4t der Pr\u00fcfung:<\/strong> Durch die kontinuierliche Datenanalyse k\u00f6nnen Pr\u00fcfer tiefere Einblicke in die Gesch\u00e4ftsprozesse gewinnen und die Qualit\u00e4t ihrer Pr\u00fcfungen steigern.<\/li>\n<li><strong>H\u00f6here Pr\u00fcfungsdichte:<\/strong> Durch die Automatisierung k\u00f6nnen mehr Pr\u00fcfungen durchgef\u00fchrt werden, was zu einer umfassenderen Abdeckung der Gesch\u00e4ftsprozesse f\u00fchrt.<\/li>\n<li><strong>Improved communication with management:<\/strong> Durch die Bereitstellung von Echtzeit-Informationen k\u00f6nnen Pr\u00fcfer eine proaktivere Rolle bei der Unterst\u00fctzung des Managements \u00fcbernehmen.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m0w8ph3y-22b1bf7cee48f5d8bae9efaf5090a728\">\n#top .av-special-heading.av-m0w8ph3y-22b1bf7cee48f5d8bae9efaf5090a728{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m0w8ph3y-22b1bf7cee48f5d8bae9efaf5090a728 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m0w8ph3y-22b1bf7cee48f5d8bae9efaf5090a728 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m0w8ph3y-22b1bf7cee48f5d8bae9efaf5090a728 av-special-heading-h3 blockquote modern-quote  avia-builder-el-26  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Continuous Monitoring f\u00fcr Governance, Risk und Compliance (GRC)<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m0w8pe07-e94b146fdedae28f539edb765305d83d'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li><strong>Improved risk assessment:<\/strong> Durch die kontinuierliche \u00dcberwachung von Risiken k\u00f6nnen Organisationen ihre Risikobewertung pr\u00e4zisieren und anpassen.<\/li>\n<li><strong>Effektivere Ma\u00dfnahmen zur Risikominderung:<\/strong> Die Identifizierung von Risiken in Echtzeit erm\u00f6glicht eine schnellere Umsetzung von Ma\u00dfnahmen zur Risikominderung.<\/li>\n<li><strong>Ensuring compliance:<\/strong> Continuous monitoring helps organisations to ensure that they comply with all relevant laws and regulations.<\/li>\n<li><strong>Improved decision-making:<\/strong> Durch die Bereitstellung von Echtzeit-Daten k\u00f6nnen Organisationen fundiertere Entscheidungen treffen.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jnskg5-618ef77b61696bcf2db7b8db58a3ed74\">\n#top .av-special-heading.av-m4jnskg5-618ef77b61696bcf2db7b8db58a3ed74{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jnskg5-618ef77b61696bcf2db7b8db58a3ed74 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jnskg5-618ef77b61696bcf2db7b8db58a3ed74 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jnskg5-618ef77b61696bcf2db7b8db58a3ed74 av-special-heading-h3 blockquote modern-quote  avia-builder-el-28  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Herausforderungen bei der Implementierung beider Ans\u00e4tze<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jnsg58-7e62261aa4615efa077802ad36b4f07b'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li><strong>Datenqualit\u00e4t:<\/strong> Die Qualit\u00e4t der Daten ist entscheidend f\u00fcr den Erfolg von Continuous Auditing und Continuous Monitoring. Unvollst\u00e4ndige oder fehlerhafte Daten k\u00f6nnen zu falschen Ergebnissen f\u00fchren.<\/li>\n<li><strong>Technology:<\/strong> Implementation requires the selection and integration of suitable technologies, such as data analytics platforms and automation tools.<\/li>\n<li><strong>Organisationale Ver\u00e4nderungen:<\/strong> Die Einf\u00fchrung von Continuous Auditing und Continuous Monitoring erfordert oft Ver\u00e4nderungen in der Organisation, wie beispielsweise eine neue Rollenverteilung und Schulungen f\u00fcr die Mitarbeiter.<\/li>\n<li><strong>Cost:<\/strong> Die Implementierung kann erhebliche Investitionen erfordern, insbesondere f\u00fcr gr\u00f6\u00dfere Organisationen.<\/li>\n<li><strong>Widerst\u00e4nde:<\/strong> Es kann Widerst\u00e4nde gegen Ver\u00e4nderungen geben, sowohl bei den Mitarbeitern als auch bei der Gesch\u00e4ftsleitung.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-20887b-afb2383d482d1660ee98d358d653f5bc\">\n.flex_column.av-20887b-afb2383d482d1660ee98d358d653f5bc{\npadding:35px 25px 30px 25px;\nbackground-color:#01064a;\nbackground:linear-gradient( to top right, #01064a, #00b3bd );\n}\n<\/style>\n<div  class='flex_column av-20887b-afb2383d482d1660ee98d358d653f5bc av_one_full  avia-builder-el-30  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-lo6y48l1-7c0e908a7726375d18bceac87b5d8be6'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong style=\"color: #ffffff;\">Robin Data ComplianceOS<\/strong><\/p>\n<p><span style=\"color: #ffffff;\">Contact us to find out how your organisation can benefit from continuous auditing and monitoring!<\/span><\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409-wrap avia-button-left  avia-builder-el-32  el_after_av_textblock  avia-builder-el-last'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409\">\n#top #wrap_all .avia-button.av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409{\nbackground-color:#00b3bd;\nborder-color:#00b3bd;\ncolor:#ffffff;\nborder-radius:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409:hover{\nbackground-color:white;\ncolor:#00b3bd;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all.avia-button.av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409:hover .avia_button_background{\nborder-radius:1px 1px 1px 1px;\n}\n#top #wrap_all .avia-button.av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409:hover .avia-svg-icon svg:first-child{\nfill:#00b3bd;\nstroke:#00b3bd;\n}\n<\/style>\n<a href='https:\/\/www.robin-data.io\/en\/events\/demo\/#anmeldung'  class='avia-button av-lo6y4ua0-b1a6a450064a5bf0ce0c0f7e6d6ae409 av-link-btn avia-icon_select-no avia-size-large avia-position-left'   aria-label=\"Book an appointment to get to know us\"><span class='avia_iconbox_title' >Book an appointment to get to know us<\/span><\/a><\/div><\/p><\/div>\n<div  id=\"ca-cm-einsatzgebiete\"  class='flex_column av-m4josr5z-443b1757ec659b01a6b2f35ff66790ba av_one_full  avia-builder-el-33  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4josifn-ece5ec5e285f57c02f37c614c17d4f7a\">\n#top .av-special-heading.av-m4josifn-ece5ec5e285f57c02f37c614c17d4f7a{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4josifn-ece5ec5e285f57c02f37c614c17d4f7a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4josifn-ece5ec5e285f57c02f37c614c17d4f7a .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-m4josifn-ece5ec5e285f57c02f37c614c17d4f7a av-special-heading-h2 blockquote modern-quote  avia-builder-el-34  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Areas of application for continuous auditing and monitoring<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jot10t-de01f404e0952338b2ffd6fe788fa091'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Continuous Auditing und Continuous Monitoring bieten Organisationen eine Vielzahl von M\u00f6glichkeiten, ihre Prozesse zu optimieren und Risiken zu minimieren.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jovgxv-98e7b8a3a6926cdaf787bb0d07fc8090\">\n#top .av-special-heading.av-m4jovgxv-98e7b8a3a6926cdaf787bb0d07fc8090{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jovgxv-98e7b8a3a6926cdaf787bb0d07fc8090 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jovgxv-98e7b8a3a6926cdaf787bb0d07fc8090 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jovgxv-98e7b8a3a6926cdaf787bb0d07fc8090 av-special-heading-h3 blockquote modern-quote  avia-builder-el-36  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Application examples in internal auditing<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jovcqb-a34545e64d89cf6f1660ac68a2eb851c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In der internen Revision erm\u00f6glichen Continuous Auditing und Monitoring eine umfassende und effiziente Pr\u00fcfung von Gesch\u00e4ftsprozessen. Neben den bereits genannten Bereichen wie Finanzwesen, Beschaffung und Personalwesen k\u00f6nnen diese Ans\u00e4tze auch in weiteren Bereichen eingesetzt werden. Im <strong>Finance <\/strong>unterst\u00fctzt die kontinuierliche \u00dcberwachung von Finanztransaktionen dabei, Betrug und Fehlbuchungen zu erkennen. Im <strong>Human Resources<\/strong> k\u00f6nnen die Kontrolle der Einhaltung von Arbeitsgesetzen und Tarifvertr\u00e4gen sichergestellt sowie Zugriffsrechte \u00fcberwacht werden. Beim Einsatz von <strong>IT systems<\/strong> k\u00f6nnen IT-Sicherheit und die Einhaltung von IT-Richtlinien \u00fcberpr\u00fcft werden. Im Zusammenhang mit dem Bereich <strong>Production<\/strong> k\u00f6nnen Produktionsabl\u00e4ufe, Qualit\u00e4tssicherung und die Einhaltung von Umweltstandards kontrolliert werden. In der Zusammenarbeit mit <strong>Suppliers<\/strong> k\u00f6nnen deren Einhaltung von Beschaffungsrichtlinien und Vertragstreue \u00fcberpr\u00fcft werden.<\/p>\n<h4><span style=\"color: #00b3bd;\">Automatisierte Vertragspr\u00fcfung mit KI: Einhaltung regulatorischer Anforderungen<\/span><\/h4>\n<p>KI-basierte Systeme werden mit gro\u00dfen Mengen von Vertragsdaten und regulatorischen Anforderungen trainiert. Auf dieser Grundlage k\u00f6nnen sie:<\/p>\n<ul>\n<li><strong>Vertr\u00e4ge klassifizieren:<\/strong> KI-Systeme k\u00f6nnen Vertr\u00e4ge automatisch nach Typ (z.B. Kaufvertrag, Dienstleistungsvertrag) und Branche klassifizieren.<\/li>\n<li><strong>Extract relevant clauses:<\/strong> KI-Systeme k\u00f6nnen relevante Klauseln, wie beispielsweise Datenschutzbestimmungen oder Wettbewerbsklauseln, aus Vertr\u00e4gen extrahieren.<\/li>\n<li><strong>Vertr\u00e4ge auf Compliance \u00fcberpr\u00fcfen:<\/strong> KI-Systeme k\u00f6nnen Vertr\u00e4ge automatisch auf ihre \u00dcbereinstimmung mit spezifischen regulatorischen Anforderungen \u00fcberpr\u00fcfen.<\/li>\n<li><strong>Identify risks:<\/strong> KI-Systeme k\u00f6nnen potenzielle Risiken, wie beispielsweise Vertragsstrafen oder Haftungsklauseln, identifizieren.<\/li>\n<\/ul>\n<h4><span style=\"color: #00b3bd;\">KI-basiertes Continuous Auditing: Plausibilit\u00e4tspr\u00fcfungen von Zugriffen auf Akten<\/span><\/h4>\n<p>KI-Systeme werden mit historischen Zugriffsdaten trainiert, um normale Zugriffsverhalten zu lernen. Anschlie\u00dfend k\u00f6nnen sie Abweichungen von diesem Normalzustand erkennen, beispielsweise:<\/p>\n<ul>\n<li>Zugriffe au\u00dferhalb der <strong>\u00fcblichen Arbeitszeiten:<\/strong> Dies k\u00f6nnte auf unbefugte Zugriffe hinweisen.<\/li>\n<li>Access to <strong>ungew\u00f6hnlich viele Dateien:<\/strong> Dies k\u00f6nnte auf Datenexfiltration hindeuten.<\/li>\n<li>Access from <strong>unbekannten Ger\u00e4ten:<\/strong> Dies k\u00f6nnte ein Hinweis auf eine Sicherheitsl\u00fccke sein.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4joxbcr-c53a6ff5b9a6d1a43f01f6d32a5a26e4\">\n#top .av-special-heading.av-m4joxbcr-c53a6ff5b9a6d1a43f01f6d32a5a26e4{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4joxbcr-c53a6ff5b9a6d1a43f01f6d32a5a26e4 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4joxbcr-c53a6ff5b9a6d1a43f01f6d32a5a26e4 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4joxbcr-c53a6ff5b9a6d1a43f01f6d32a5a26e4 av-special-heading-h3 blockquote modern-quote  avia-builder-el-38  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Efficient control of processes through continuous monitoring<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jox5yg-ca0e80e17864437e1fceefdec0f56b9f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Durch die kontinuierliche \u00dcberwachung von Prozessen k\u00f6nnen Organisationen nicht nur Risiken minimieren, sondern auch ihre Effizienz steigern. Dies wird erm\u00f6glicht durch:<\/p>\n<ul>\n<li><strong>Identifizierung von Engp\u00e4ssen:<\/strong> Durch die Analyse von Prozessdaten k\u00f6nnen Engp\u00e4sse schnell erkannt und behoben werden.<\/li>\n<li><strong>Optimierung von Abl\u00e4ufen:<\/strong> Die kontinuierliche \u00dcberwachung erm\u00f6glicht es, Abl\u00e4ufe zu optimieren und unn\u00f6tige Schritte zu eliminieren.<\/li>\n<li><strong>Verbesserung der Qualit\u00e4t:<\/strong> Durch die fr\u00fchzeitige Erkennung von Qualit\u00e4tsm\u00e4ngeln k\u00f6nnen Organisationen ihre Produkt- und Dienstleistungsqualit\u00e4t verbessern.<\/li>\n<li><strong>Qualit\u00e4tsmanagement:<\/strong> Sicherstellung der Einhaltung von Qualit\u00e4tsstandards und die kontinuierliche Verbesserung von Produkten und Dienstleistungen.<\/li>\n<li><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-3\"><strong>Risk Management<\/strong><\/a>: KI-gest\u00fctzte Systeme \u00fcberwachen kontinuierlich auf Risiken, l\u00f6sen automatisch Alarmketten aus und unterst\u00fctzen bei der Entscheidungsfindung f\u00fcr eine schnelle und effiziente Reaktion.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jozfy5-3f916c9c1fe5df14f4bc34af0d09585e\">\n#top .av-special-heading.av-m4jozfy5-3f916c9c1fe5df14f4bc34af0d09585e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jozfy5-3f916c9c1fe5df14f4bc34af0d09585e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jozfy5-3f916c9c1fe5df14f4bc34af0d09585e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jozfy5-3f916c9c1fe5df14f4bc34af0d09585e av-special-heading-h3 blockquote modern-quote  avia-builder-el-40  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >\u00dcberwachung und Sicherheit in IT-Systemen<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jozbst-0472c40367099c537444f0dddce67d98'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Die IT-Sicherheit gewinnt in der heutigen digitalisierten Welt immer mehr an Bedeutung. Continuous Monitoring erm\u00f6glicht es Organisationen, ihre IT-Systeme proaktiv zu sch\u00fctzen und Risiken zu minimieren. Dies umfasst:<\/p>\n<ul>\n<li><strong>Detection of cyber attacks:<\/strong> Durch die kontinuierliche Analyse von Netzwerkverkehr und Systemlogs k\u00f6nnen Cyberangriffe fr\u00fchzeitig erkannt und abgewehrt werden.<\/li>\n<li><strong>Protection of sensitive data:<\/strong> Continuous monitoring helps to ensure the protection of sensitive data and prevent data breaches.<\/li>\n<li><strong>Compliance with IT security standards:<\/strong> Organisationen k\u00f6nnen die Einhaltung von IT-Sicherheitsstandards wie ISO 27001 oder NIST CSF sicherstellen.<\/li>\n<li><strong>Cybersecurity:<\/strong> Detection of cyber attacks and security breaches in real time.<\/li>\n<li><strong>Access control:<\/strong> \u00dcberwachung von Benutzerzugriffen und Identifizierung von unbefugten Zugriffen.<\/li>\n<li><strong>Datenintegrit\u00e4t:<\/strong> Sicherung der Integrit\u00e4t von Daten und Schutz vor Datenverlust.<\/li>\n<li><strong>Compliance:<\/strong> Ensuring compliance with data protection regulations such as the GDPR.<\/li>\n<li><strong>Backup-\u00dcberwachung:<\/strong> KI-gest\u00fctzte Systeme identifizieren Backup-Fehler proaktiv, reduzieren das Risiko von Datenverlust und optimieren Compliance-Prozesse.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jp2h0k-e0e0d0f6100875caa375596b5d1ac4fe\">\n#top .av-special-heading.av-m4jp2h0k-e0e0d0f6100875caa375596b5d1ac4fe{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jp2h0k-e0e0d0f6100875caa375596b5d1ac4fe .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jp2h0k-e0e0d0f6100875caa375596b5d1ac4fe .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jp2h0k-e0e0d0f6100875caa375596b5d1ac4fe av-special-heading-h3 blockquote modern-quote  avia-builder-el-42  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Compliance with industry standards<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jp2bel-ca9a43f4ddf6f0c50513b07f30a1d67b'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Viele Branchen unterliegen spezifischen gesetzlichen und regulatorischen Anforderungen. Continuous Auditing und Continuous Monitoring unterst\u00fctzen Organisationen dabei, diese Anforderungen einzuhalten. Beispiele hierf\u00fcr sind:<\/p>\n<ul>\n<li><strong>General:<\/strong>Proaktive Identifizierung und Anpassung an sich \u00e4ndernde regulatorische Anforderungen, wie CSRD, NIS2 und Lieferkettengesetzgebung, f\u00fcr eine kontinuierliche Rechtskonformit\u00e4t.<\/li>\n<li><strong>financial industry:<\/strong> Compliance with Basel III, Solvency II and other regulatory requirements.<\/li>\n<li><strong>Healthcare:<\/strong> Compliance mit Datenschutzbestimmungen (DSGVO, HIPAA) und Qualit\u00e4tsstandards.<\/li>\n<li><strong>Energy supply:<\/strong> Compliance with environmental protection regulations and safety standards.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div><div  id=\"ca-cm-methoden-tools\"  class='flex_column av-m4jp865w-63695e348fbc4046cbcea8dcce2c77c0 av_one_full  avia-builder-el-44  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jp7x9v-549fa8f714bc7b9b10de5764b8466835\">\n#top .av-special-heading.av-m4jp7x9v-549fa8f714bc7b9b10de5764b8466835{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jp7x9v-549fa8f714bc7b9b10de5764b8466835 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jp7x9v-549fa8f714bc7b9b10de5764b8466835 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-m4jp7x9v-549fa8f714bc7b9b10de5764b8466835 av-special-heading-h2 blockquote modern-quote  avia-builder-el-45  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Methoden und Tools f\u00fcr Continuous Auditing und Monitoring<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jp8f4e-33910f1bf03b7cdcdfcef9426869eb34'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Die erfolgreiche Umsetzung von Continuous Auditing und Monitoring ist eng mit dem Einsatz geeigneter Technologien verkn\u00fcpft. Diese erm\u00f6glichen es, gro\u00dfe Datenmengen in Echtzeit zu analysieren, Abweichungen zu erkennen und automatisierte Pr\u00fcfungsverfahren durchzuf\u00fchren. Die verschiedenen Tools f\u00fcr Continuous Auditing und Monitoring arbeiten h\u00e4ufig eng zusammen. Beispielsweise k\u00f6nnen Daten aus SIEM-Systemen an eine GRC-L\u00f6sung \u00fcbermittelt werden, um Risiken zu bewerten und Ma\u00dfnahmen einzuleiten. Die Auswahl der richtigen Tools f\u00fcr Continuous Auditing und Monitoring h\u00e4ngt von den spezifischen Anforderungen des Organisationens ab. Eine Kombination aus verschiedenen Tools kann dabei helfen, eine umfassende und effiziente \u00dcberwachung zu gew\u00e4hrleisten.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jp8phu-09ee7767c4f4bf7a5b7f0120c30b590c\">\n#top .av-special-heading.av-m4jp8phu-09ee7767c4f4bf7a5b7f0120c30b590c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jp8phu-09ee7767c4f4bf7a5b7f0120c30b590c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jp8phu-09ee7767c4f4bf7a5b7f0120c30b590c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jp8phu-09ee7767c4f4bf7a5b7f0120c30b590c av-special-heading-h3 blockquote modern-quote  avia-builder-el-47  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Automation through AI and data analytics<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jp8xyo-8975421232bfd159047e966d2630f119'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>K\u00fcnstliche Intelligenz (KI) und Data Analytics spielen eine zentrale Rolle bei der Automatisierung von Continuous Auditing und Monitoring. Durch den Einsatz von Machine Learning-Algorithmen k\u00f6nnen Organisationen:<\/p>\n<ul>\n<li><strong>Recognise anomalies:<\/strong> Deviations from normal patterns and behaviour are automatically identified, indicating potential risks.<\/li>\n<li><strong>Create forecasts:<\/strong> Basierend auf historischen Daten k\u00f6nnen zuk\u00fcnftige Entwicklungen vorhergesagt werden, um proaktiv Ma\u00dfnahmen ergreifen zu k\u00f6nnen.<\/li>\n<li><strong>Recognise patterns:<\/strong> Komplexe Zusammenh\u00e4nge in gro\u00dfen Datenmengen k\u00f6nnen aufgedeckt werden, um versteckte Risiken aufzudecken.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-120yc3c-367a04697ef5daec553bf8ad44a52677\">\n#top .hr.hr-invisible.av-120yc3c-367a04697ef5daec553bf8ad44a52677{\nheight:30px;\n}\n<\/style>\n<div  id=\"iks-reifegrad\"  class='hr av-120yc3c-367a04697ef5daec553bf8ad44a52677 hr-invisible  avia-builder-el-49  el_after_av_textblock  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jp94p2-31b9c117f4b6b293dc3b1ca5eb57d874\">\n#top .av-special-heading.av-m4jp94p2-31b9c117f4b6b293dc3b1ca5eb57d874{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jp94p2-31b9c117f4b6b293dc3b1ca5eb57d874 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jp94p2-31b9c117f4b6b293dc3b1ca5eb57d874 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jp94p2-31b9c117f4b6b293dc3b1ca5eb57d874 av-special-heading-h3 blockquote modern-quote  avia-builder-el-50  el_after_av_hr  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Softwarel\u00f6sungen f\u00fcr Continuous Auditing<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jp9btq-343416ae841c6cb0c037e13adb06fc0a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>F\u00fcr Continuous Auditing stehen eine Vielzahl von Softwarel\u00f6sungen zur Verf\u00fcgung, die speziell auf die Bed\u00fcrfnisse von Organisationen zugeschnitten sind. Zu den wichtigsten Kategorien geh\u00f6ren:<\/p>\n<ul>\n<li><strong>Governance, risk and compliance (GRC) tools:<\/strong> Diese Tools unterst\u00fctzen Organisationen bei der Verwaltung von Risiken, der Einhaltung von Vorschriften und der Verbesserung der Governance. Sie bieten Funktionen wie Risikobewertung, Compliance-Management und Berichtswesen.<\/li>\n<li><strong>Automated audit software:<\/strong> This software automates repetitive audit tasks, such as collecting and analysing data.<\/li>\n<li><strong>Data analysis tools:<\/strong> Mit Hilfe von Datenanalyse-Tools k\u00f6nnen gro\u00dfe Datenmengen schnell und effizient analysiert werden, um Muster und Trends zu erkennen.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-tx5sig-34c7273a02d035b0e493a44a0aaf65e2\">\n#top .hr.hr-invisible.av-tx5sig-34c7273a02d035b0e493a44a0aaf65e2{\nheight:30px;\n}\n<\/style>\n<div  id=\"iks-reifegrad\"  class='hr av-tx5sig-34c7273a02d035b0e493a44a0aaf65e2 hr-invisible  avia-builder-el-52  el_after_av_textblock  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4jp9ksp-c7a9050ae5fcfde54fa1bb9a6893daf3\">\n#top .av-special-heading.av-m4jp9ksp-c7a9050ae5fcfde54fa1bb9a6893daf3{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-m4jp9ksp-c7a9050ae5fcfde54fa1bb9a6893daf3 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-m4jp9ksp-c7a9050ae5fcfde54fa1bb9a6893daf3 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"auditarten\"  class='av-special-heading av-m4jp9ksp-c7a9050ae5fcfde54fa1bb9a6893daf3 av-special-heading-h3 blockquote modern-quote  avia-builder-el-53  el_after_av_hr  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Tools f\u00fcr kontinuierliches Monitoring von Daten und Prozessen<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-m4jp9sjh-e7927b9fa18d12c5182522afe5ceed12'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Um Daten und Prozesse kontinuierlich zu \u00fcberwachen, werden folgende Tools eingesetzt:<\/p>\n<ul>\n<li><strong>Security Information and Event Management Systems (SIEM):<\/strong> SIEM-Systeme sammeln und analysieren Logdaten aus verschiedenen Quellen, um Sicherheitsvorf\u00e4lle zu erkennen und zu untersuchen.<\/li>\n<li><strong>Endpoint Detection and Response (EDR):<\/strong> EDR-L\u00f6sungen \u00fcberwachen Endger\u00e4te wie PCs und Laptops auf verd\u00e4chtige Aktivit\u00e4ten und k\u00f6nnen bei Bedarf automatisch reagieren.<\/li>\n<li><strong>Logdaten von Firewalls, IDS\/IPS-Systemen und SIEM-L\u00f6sungen:<\/strong> Diese Logdaten liefern wertvolle Informationen \u00fcber den Netzwerkverkehr und k\u00f6nnen zur Identifizierung von Sicherheitsbedrohungen genutzt werden.<\/li>\n<li><strong>Results from vulnerability scanners and patch management systems:<\/strong> Durch die regelm\u00e4\u00dfige \u00dcberpr\u00fcfung von Systemen auf Schwachstellen k\u00f6nnen Organisationen Risiken minimieren.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1kxvsns-7f9eab36a832ffb0bb3b6fd7e5658332\">\n.flex_column.av-1kxvsns-7f9eab36a832ffb0bb3b6fd7e5658332{\npadding:35px 25px 30px 25px;\nbackground-color:#01064a;\nbackground:linear-gradient( to top right, #01064a, #00b3bd );\n}\n<\/style>\n<div  class='flex_column av-1kxvsns-7f9eab36a832ffb0bb3b6fd7e5658332 av_one_full  avia-builder-el-55  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-18dp2pk-deea1ca92450a660a36b02f9e76506da'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong style=\"color: #ffffff;\">Robin Data ComplianceOS<\/strong><\/p>\n<p><span style=\"color: #ffffff;\">Contact us to find out how your organisation can benefit from continuous auditing and monitoring!<\/span><\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-jog1ko-50624d1f470956be190580b0d1d3f8b6-wrap avia-button-left  avia-builder-el-57  el_after_av_textblock  avia-builder-el-last'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jog1ko-50624d1f470956be190580b0d1d3f8b6\">\n#top #wrap_all .avia-button.av-jog1ko-50624d1f470956be190580b0d1d3f8b6{\nbackground-color:#00b3bd;\nborder-color:#00b3bd;\ncolor:#ffffff;\nborder-radius:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-jog1ko-50624d1f470956be190580b0d1d3f8b6:hover{\nbackground-color:white;\ncolor:#00b3bd;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all.avia-button.av-jog1ko-50624d1f470956be190580b0d1d3f8b6:hover .avia_button_background{\nborder-radius:1px 1px 1px 1px;\n}\n#top #wrap_all .avia-button.av-jog1ko-50624d1f470956be190580b0d1d3f8b6 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-jog1ko-50624d1f470956be190580b0d1d3f8b6:hover .avia-svg-icon svg:first-child{\nfill:#00b3bd;\nstroke:#00b3bd;\n}\n<\/style>\n<a href='https:\/\/www.robin-data.io\/en\/events\/demo\/#anmeldung'  class='avia-button av-jog1ko-50624d1f470956be190580b0d1d3f8b6 av-link-btn avia-icon_select-no avia-size-large avia-position-left'   aria-label=\"Book an appointment to get to know us\"><span class='avia_iconbox_title' >Book an appointment to get to know us<\/span><\/a><\/div><\/p><\/div>\n<div  id=\"mensch-als-entscheider\"  class='flex_column av-1s7fidj-7e22002240cd4be9a05847662a621dd3 av_one_full  avia-builder-el-58  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-12epftz-dd9e1e6a8da06174b4cfb45716899948\">\n#top .av-special-heading.av-12epftz-dd9e1e6a8da06174b4cfb45716899948{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-12epftz-dd9e1e6a8da06174b4cfb45716899948 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-12epftz-dd9e1e6a8da06174b4cfb45716899948 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-12epftz-dd9e1e6a8da06174b4cfb45716899948 av-special-heading-h2 blockquote modern-quote  avia-builder-el-59  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >The role of humans in AI-driven auditing and monitoring<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-37gapz-a03487f3381d36e443aab655729ae41b'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Der Mensch bleibt trotz Automatisierung im Mittelpunkt des Entscheidungsprozesses. KI entlastet durch die \u00dcbernahme repetitiver, datenintensiver Aufgaben, doch die finale Entscheidung liegt beim Menschen.<\/p>\n<h3>Wichtige Grunds\u00e4tze:<\/h3>\n<ul>\n<li><strong>AI relieved:<\/strong> Die Technologie analysiert gro\u00dfe Datenmengen und identifiziert Auff\u00e4lligkeiten.<\/li>\n<li><strong>People decide:<\/strong> Based on the information processed by AI, humans remain the central decision-makers.<\/li>\n<li><strong>Regulierung gew\u00e4hrleistet Sicherheit:<\/strong> Die KI wird in \u00dcbereinstimmung mit den gesetzlichen Vorgaben entwickelt und betrieben.<\/li>\n<\/ul>\n<p>Das deutsche KI-Gesetz schreibt vor, dass KI-Systeme nicht die alleinige Entscheidungsinstanz sein d\u00fcrfen. Sie sollen den Menschen unterst\u00fctzen, nicht ersetzen.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m64tidqf-ba6f19b5997b2eb1167586954b0dde39\">\n.avia-image-container.av-m64tidqf-ba6f19b5997b2eb1167586954b0dde39 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-m64tidqf-ba6f19b5997b2eb1167586954b0dde39 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-m64tidqf-ba6f19b5997b2eb1167586954b0dde39 av-styling- avia-align-center  avia-builder-el-61  el_after_av_textblock  avia-builder-el-last'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" loading=\"lazy\" class='wp-image-16738 avia-img-lazy-loading-16738 avia_image' src=\"https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI-705x399.png\" alt='Presentation of the difference between continuous auditing and continuous monitoring' title='Difference between continuous auditing and continuous monitoring'  height=\"399\" width=\"705\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI-705x399.png 705w, https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI-300x170.png 300w, https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI-1030x583.png 1030w, https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI-768x435.png 768w, https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI-18x10.png 18w, https:\/\/media.robin-data.io\/2025\/01\/20100035\/Mensch-bleibt-Entscheider-KI.png 1146w\" sizes=\"auto, (max-width: 705px) 100vw, 705px\" \/><\/div><\/div><\/div><\/p><\/div>\n<div  id=\"fazit\"  class='flex_column av-1geig8t-424fd43c56d236925b1db0cd28fd9645 av_one_full  avia-builder-el-62  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1bi800t-3bfb572e43f05b58a0d954dcbd64db74\">\n#top .av-special-heading.av-1bi800t-3bfb572e43f05b58a0d954dcbd64db74{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1bi800t-3bfb572e43f05b58a0d954dcbd64db74 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1bi800t-3bfb572e43f05b58a0d954dcbd64db74 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"fazit\"  class='av-special-heading av-1bi800t-3bfb572e43f05b58a0d954dcbd64db74 av-special-heading-h2 blockquote modern-quote  avia-builder-el-63  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Fazit: Continuous Auditing und Monitoring \u2013 Zukunftssicher und effizient<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-sf7x31-81aa2fbb48fe69e687a8765ede45a251'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Continuous Auditing und Continuous Monitoring sind essenzielle Ans\u00e4tze, um Organisationen in einer sich st\u00e4ndig ver\u00e4ndernden Gesch\u00e4ftswelt zukunftssicher aufzustellen. Sie erm\u00f6glichen eine proaktive Risikosteuerung, optimieren die Effizienz interner Prozesse und stellen die Einhaltung von Compliance-Vorgaben sicher. W\u00e4hrend Continuous Auditing den Fokus auf die Pr\u00fcfung interner Kontrollsysteme legt, erweitert Continuous Monitoring diesen Ansatz durch die fortlaufende \u00dcberwachung von Prozessen, Risiken und gesetzlichen Anforderungen.<\/p>\n<p>Durch den Einsatz moderner Technologien, insbesondere KI, k\u00f6nnen Organisationen traditionelle Pr\u00fcfmethoden erg\u00e4nzen und ihre Revision auf das n\u00e4chste Level heben. Entscheidend dabei ist, die richtige Balance zwischen technologischem Fortschritt und menschlicher Entscheidungsf\u00e4higkeit zu wahren \u2013 stets im Einklang mit regulatorischen Vorgaben wie dem deutschen KI-Gesetz.<\/p>\n<p>Continuous Auditing und Monitoring sind somit mehr als nur Werkzeuge \u2013 sie sind ein strategischer Schl\u00fcssel, um sich effizient und sicher den Herausforderungen der Digitalisierung zu stellen und langfristig wettbewerbsf\u00e4hig zu bleiben.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-65  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-67  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Gef\u00e4llt Ihnen der Beitrag? Teilen Sie diesen gern.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2&#038;t=Continuous%20Auditing%20%26%20Monitoring' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Continuous%20Auditing%20%26%20Monitoring&#038;url=https:\/\/www.robin-data.io\/en\/?p=16664' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Continuous%20Auditing%20%26%20Monitoring&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Continuous%20Auditing%20%26%20Monitoring&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-68  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">Das k\u00f6nnte Sie auch interessieren:<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-70  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-71  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-13099 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/activity-report-template-sample-content-according-to-gdpr' data-rel='slide-1' class='slide-image' title='T\u00e4tigkeitsbericht nach DSGVO'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150313\/Dokumentationspflichten-495x343.jpg\" class=\"wp-image-14057 avia-img-lazy-loading-not-14057 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: T\u00e4tigkeitsbericht nach DSGVO\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/activity-report-template-sample-content-according-to-gdpr' title='T\u00e4tigkeitsbericht nach DSGVO'>T\u00e4tigkeitsbericht nach DSGVO<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Vorlagen, Whitepaper und Umsetzung des T\u00e4tigkeitsbericht nach DSGVO. In wenigen Schritten automatisiert den T\u00e4tigkeitsbericht erstellen.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/activity-report-template-sample-content-according-to-gdpr\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-03-04T10:32:48+01:00\" >4 March 2022<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/activity-report-template-sample-content-according-to-gdpr#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150313\/Dokumentationspflichten.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2025-01-20T11:05:52+01:00\" >2022-03-04 10:32:48<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-22 09:38:20<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>T\u00e4tigkeitsbericht nach DSGVO<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-12641 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/erasure-concept-gdpr' data-rel='slide-1' class='slide-image' title='L\u00f6schkonzept nach DSGVO'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150329\/Verzeichnis-Verarbeitungstaetigkeiten-495x343.jpg\" class=\"wp-image-14068 avia-img-lazy-loading-not-14068 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: L\u00f6schkonzept nach DSGVO\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/erasure-concept-gdpr' title='L\u00f6schkonzept nach DSGVO'>L\u00f6schkonzept nach DSGVO<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Muster, Vorlagen und Beispiele f\u00fcr Ihr DSGVO L\u00f6schkonzept gem\u00e4\u00df DIN 66398. Automatisiert das L\u00f6schkonzept erstellen.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/erasure-concept-gdpr\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-12-17T14:04:29+01:00\" >17 December 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/erasure-concept-gdpr#comments'>1 Comment<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150329\/Verzeichnis-Verarbeitungstaetigkeiten.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2025-01-20T11:05:52+01:00\" >2021-12-17 14:04:29<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-22 09:38:43<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>L\u00f6schkonzept nach DSGVO<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-1715 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/directory-of-processing-activities-2' data-rel='slide-1' class='slide-image' title='Verzeichnis von Verarbeitungst\u00e4tigkeiten'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150329\/Verzeichnis-Verarbeitungstaetigkeiten-495x343.jpg\" class=\"wp-image-14068 avia-img-lazy-loading-not-14068 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Verzeichnis von Verarbeitungst\u00e4tigkeiten\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/directory-of-processing-activities-2' title='Verzeichnis von Verarbeitungst\u00e4tigkeiten'>Verzeichnis von Verarbeitungst\u00e4tigkeiten<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Verzeichnis von Verarbeitungst\u00e4tigkeit nach Art. 30 DSGVO. Schritt f\u00fcr Schritt erkl\u00e4rt mit umfangreichen Informationen. Datenschutz einfach gemacht.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/directory-of-processing-activities-2\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-07-16T09:26:54+02:00\" >16 July 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/directory-of-processing-activities-2#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150329\/Verzeichnis-Verarbeitungstaetigkeiten.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2025-01-20T11:05:52+01:00\" >2021-07-16 09:26:54<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-04-22 09:38:59<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Verzeichnis von Verarbeitungst\u00e4tigkeiten<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Erfahren Sie alles \u00fcber Continuous Auditing und Continuous Monitoring \u2013 Methoden und Best Practices f\u00fcr mehr Effizienz und Transparenz.<\/p>","protected":false},"author":3,"featured_media":15509,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[178],"class_list":["post-16664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-compliance-management-system"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Continuous Auditing: Datengetriebene Pr\u00fcfung in Echtzeit<\/title>\n<meta name=\"description\" content=\"Continuous Auditing &amp; Monitoring: Managen Sie Anforderungen, Sicherheitsstandards und Risiken in Echtzeit. Erfahren Sie mehr!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous Auditing &amp; Monitoring\" \/>\n<meta property=\"og:description\" content=\"Continuous Auditing &amp; Monitoring: Managen Sie Anforderungen, Sicherheitsstandards und Risiken in Echtzeit. Erfahren Sie mehr!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T10:05:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-28T13:09:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Continuous Auditing &#038; Monitoring\",\"datePublished\":\"2025-01-20T10:05:52+00:00\",\"dateModified\":\"2025-03-28T13:09:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring\"},\"wordCount\":12486,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg\",\"keywords\":[\"compliance-management-system\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring\",\"name\":\"Continuous Auditing: Datengetriebene Pr\u00fcfung in Echtzeit\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg\",\"datePublished\":\"2025-01-20T10:05:52+00:00\",\"dateModified\":\"2025-03-28T13:09:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Continuous Auditing & Monitoring: Managen Sie Anforderungen, Sicherheitsstandards und Risiken in Echtzeit. Erfahren Sie mehr!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Continuous Auditing &#038; Monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Continuous Auditing: Datengetriebene Pr\u00fcfung in Echtzeit","description":"Continuous Auditing &amp; Monitoring: Manage requirements, security standards and risks in real time. Find out more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2","og_locale":"en_GB","og_type":"article","og_title":"Continuous Auditing & Monitoring","og_description":"Continuous Auditing & Monitoring: Managen Sie Anforderungen, Sicherheitsstandards und Risiken in Echtzeit. Erfahren Sie mehr!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/internal-control-assessment-2","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2025-01-20T10:05:52+00:00","article_modified_time":"2025-03-28T13:09:44+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg","type":"image\/jpeg"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Continuous Auditing &#038; Monitoring","datePublished":"2025-01-20T10:05:52+00:00","dateModified":"2025-03-28T13:09:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring"},"wordCount":12486,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg","keywords":["compliance-management-system"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring","name":"Continuous Auditing: Datengetriebene Pr\u00fcfung in Echtzeit","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg","datePublished":"2025-01-20T10:05:52+00:00","dateModified":"2025-03-28T13:09:44+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"Continuous Auditing &amp; Monitoring: Manage requirements, security standards and risks in real time. Find out more!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#primaryimage","url":"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg","contentUrl":"https:\/\/media.robin-data.io\/2023\/04\/19104810\/Risiko-Management.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/continuous-auditing-und-continuous-monitoring#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Continuous Auditing &#038; Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae Das Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/16664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=16664"}],"version-history":[{"count":31,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/16664\/revisions"}],"predecessor-version":[{"id":17084,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/16664\/revisions\/17084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/15509"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=16664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=16664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=16664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}