{"id":6862,"date":"2021-12-04T16:34:26","date_gmt":"2021-12-04T15:34:26","guid":{"rendered":"https:\/\/sic.or.at\/en\/?p=6862"},"modified":"2021-12-04T16:36:36","modified_gmt":"2021-12-04T15:36:36","slug":"review-cyber-security-night-2021","status":"publish","type":"post","link":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/","title":{"rendered":"Review &#8211; Cyber Security Night 2021"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]<strong>When the enemy is within the company &#8211; experience cyber attacks and their consequences live on stage. On November 4th, the UBIT Expert Group for IT Security held its annual main event for the 5th time on the topics of data protection, weak points in IT networks and security in the network together with the State Criminal Police Office of Carinthia.<\/strong><\/p>\n<hr \/>\n<p>Cybercrime cases are increasing worldwide. The consequences of a loss event are often even life-threatening. \u201cWhen the enemy is in the company\u201d was the focus of the Cyber Security Night in Klagenfurt. IT experts and IT forensics experts explained what is really important when it comes to data security in a company.<\/p>\n<h2>Cyber Security Night 2021<\/h2>\n<p>&nbsp;<\/p>\n<div id=\"attachment_6833\" style=\"width: 310px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6833\" class=\"wp-image-6833 size-medium\" src=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-300x200.jpg 300w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-1024x683.jpg 1024w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-768x512.jpg 768w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-1536x1024.jpg 1536w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-2048x1366.jpg 2048w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-500x333.jpg 500w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn1-900x600.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-6833\" class=\"wp-caption-text\">f.l.: Marc Gfrerer (4conform GmbH), Kurt Wolf (WKK) and UBIT Chariman Martin Zandonella in a secure environment<\/p><\/div>\n<p>At the entrance to MAKERSPACE Klagenfurt on November 4th at around 5:30 p.m. it became clear &#8211; safety is the top priority here. The participants were welcomed through a corridor consisting of numerous blue uniforms &#8211; well protected.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<div id=\"attachment_6837\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6837\" class=\"wp-image-6837 size-medium\" src=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-300x200.jpg 300w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-1024x683.jpg 1024w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-768x512.jpg 768w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-1536x1024.jpg 1536w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-2048x1366.jpg 2048w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-500x333.jpg 500w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn5-900x600.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-6837\" class=\"wp-caption-text\">f.l.: UBIT Expert Groups Chairman Martin Zandonella, CoC President J\u00fcrgen Mandl and Moderator Thorsten Jost.<\/p><\/div>\n<p>The event was opened by IT Security Expert Group spokesman and SIC focus group leader <strong>Thorsten Jost<\/strong> (secriso Consulting GmbH), who also led the evening as a data protection expert and witty moderator. During the opening ceremony, CoC President <strong>J\u00fcrgen Mandl<\/strong> and UBIT Expert Groups Chairman <strong>Martin Zandonella<\/strong> shared their experiences and assessments of cyber crime in the technical and economic environment.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Questioning the requirement for sensitive data<\/h3>\n<p>With <strong>Christian Baumgartner<\/strong> as an experienced IT forensic scientist, the State Criminal Police Office also clearly demonstrated the serious economic and existential consequences of cyber crime with numerous practical scenarios and terrifying statistics and facts in the regional as well as national environment of affected companies.<\/p>\n<p>In order to create a concrete awareness of the potential weak points for a cyber attack within your own company, the IT security experts, in cooperation with the security experts <strong>Holger Schmitz<\/strong> and <strong>Wolfgang Stauder<\/strong>, managing directors of <a href=\"https:\/\/www.expertgruppe.at\/\" target=\"_blank\" rel=\"noopener\">Trainexpert (TE)<\/a>, staged a deployment of the criminal investigation department in the company , in which due to the tracing of an internal company IP address for an illegal purchase of addictive substances in the <em>deep web<\/em> and insufficient information and lack of information on the part of the employer, the entire company hardware had to be confiscated for an investigation so the company was no longer able to do its day-to-day business for a certain period of time.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6840 \" src=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-1024x683.jpg\" alt=\"\" width=\"1024\" height=\"683\" srcset=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-1024x683.jpg 1024w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-300x200.jpg 300w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-768x512.jpg 768w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-1536x1024.jpg 1536w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-2048x1366.jpg 2048w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-500x333.jpg 500w, https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/csn8-900x600.jpg 900w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Fictitious? Probably not. According to the expert, <strong>63% of all white-collar crime cases are \u201cinternal perpetrators\u201d<\/strong>, ie employees who use access to sensitive company data for their own purposes. Home office also plays a major role here. It is best to clarify important decisions over the phone and question unclear emails.<\/p>\n<blockquote><p>&#8220;Data protection and IT security is not a one-time investment, but an ongoing process. We call this monitoring.&#8221;<\/p><\/blockquote>\n<h3>Protecting and Securing Data for digital Emergencies<\/h3>\n<p>Holger Schmitz and Wolfgang Stauder also contributed their expertise as part of their own keynote speech on the subject of data protection and finding offenders within their own network using log files, correct firewall configuration and numerous other approaches. <strong>\u201cData protection and IT security is not a one-time investment, but an ongoing process. We call it monitoring\u201d<\/strong>, says Holger Schmitz from Trainexpert.<\/p>\n<p>The event was rounded off with a contribution by Kerstin Keltner, insurance advisor at Koban S\u00fcdvers Group GmbH. The expert for cyber insurance and protection against damage in the digital area, in particular, went into current threats such as ransomware or phishing and explained how to help in an emergency.<\/p>\n<p>The event was rounded off with a contribution by <strong>Kerstin Keltner<\/strong>, insurance advisor at <a href=\"https:\/\/www.kobangroup.at\/\" target=\"_blank\" rel=\"noopener\">Koban S\u00fcdvers Group GmbH<\/a>. The expert for cyber insurance and protection against damage in the digital area, in particular, went into current threats such as <em>ransomware<\/em> or <em>phishing<\/em> and explained how to help in an emergency.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_gallery type=&#8221;nectarslider_style&#8221; images=&#8221;6842,6843,6844&#8243; image_loading=&#8221;default&#8221; flexible_slider_height=&#8221;true&#8221; bullet_navigation_style=&#8221;see_through&#8221; onclick=&#8221;link_no&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>WKK Funding Model for Cyber Security Initiatives<\/h3>\n<p>The new funding model <a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/CS_Flyer_210x105_4Seiten_Low.pdf\" target=\"_blank\" rel=\"noopener\">\u201cStart with Security!\u201d<\/a> is also intended to improve IT security in Carinthia, which EPUs and SMEs should benefit from. <strong>&#8220;It is extremely important to take preventive action against cyber crime&#8221;<\/strong>, said Martin Zandonella. As part of the low-threshold funding model, entrepreneurs have the opportunity to apply for funding for investments, advice and training for employees in the field of IT security in cooperation with UBIT service providers and consultants from the IT security expert group of the WKK.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_gallery type=&#8221;nectarslider_style&#8221; images=&#8221;6863,6833,6834,6835,6836,6837,6838,6839,6840,6841,6842,6843,6844,6845,6846&#8243; image_loading=&#8221;default&#8221; flexible_slider_height=&#8221;true&#8221; bullet_navigation_style=&#8221;see_through&#8221; onclick=&#8221;link_no&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]We would like to thank the organizers and all participants for the great and informative event and are already looking forward to the next edition of the Cyber Security Night. A visual summary of the CSN 21 is also available in the <a href=\"https:\/\/www.kt1.at\/cyber-security-night-2021\/\" target=\"_blank\" rel=\"noopener\">KT1 media library<\/a>!<\/p>\n<p><strong>With trustworthy digital greetings from the SIC!<\/strong>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":9,"featured_media":6863,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"coauthors":[78],"class_list":{"0":"post-6862","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Review - Cyber Security Night 2021 - SIC (EN)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review - Cyber Security Night 2021 - SIC (EN)\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"SIC (EN)\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-04T15:34:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-04T15:36:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1395\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Struger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Struger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/\",\"url\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/\",\"name\":\"Review - Cyber Security Night 2021 - SIC (EN)\",\"isPartOf\":{\"@id\":\"https:\/\/sic.or.at\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg\",\"datePublished\":\"2021-12-04T15:34:26+00:00\",\"dateModified\":\"2021-12-04T15:36:36+00:00\",\"author\":{\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\"},\"breadcrumb\":{\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#primaryimage\",\"url\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg\",\"contentUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg\",\"width\":2560,\"height\":1395},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sic.or.at\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Review &#8211; Cyber Security Night 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sic.or.at\/en\/#website\",\"url\":\"https:\/\/sic.or.at\/en\/\",\"name\":\"SIC (EN)\",\"description\":\"Software Internet Cluster\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sic.or.at\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\",\"name\":\"Patrick Struger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"caption\":\"Patrick Struger\"},\"sameAs\":[\"https:\/\/www.sic.or.at\"],\"url\":\"https:\/\/sic.or.at\/en\/author\/pstruger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review - Cyber Security Night 2021 - SIC (EN)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/","og_locale":"en_US","og_type":"article","og_title":"Review - Cyber Security Night 2021 - SIC (EN)","og_description":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...","og_url":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/","og_site_name":"SIC (EN)","article_published_time":"2021-12-04T15:34:26+00:00","article_modified_time":"2021-12-04T15:36:36+00:00","og_image":[{"width":2560,"height":1395,"url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg","type":"image\/jpeg"}],"author":"Patrick Struger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Struger","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/","url":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/","name":"Review - Cyber Security Night 2021 - SIC (EN)","isPartOf":{"@id":"https:\/\/sic.or.at\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#primaryimage"},"image":{"@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg","datePublished":"2021-12-04T15:34:26+00:00","dateModified":"2021-12-04T15:36:36+00:00","author":{"@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd"},"breadcrumb":{"@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#primaryimage","url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg","contentUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2021\/12\/sic_csn_21-scaled-e1638632138502.jpg","width":2560,"height":1395},{"@type":"BreadcrumbList","@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sic.or.at\/en\/"},{"@type":"ListItem","position":2,"name":"Review &#8211; Cyber Security Night 2021"}]},{"@type":"WebSite","@id":"https:\/\/sic.or.at\/en\/#website","url":"https:\/\/sic.or.at\/en\/","name":"SIC (EN)","description":"Software Internet Cluster","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sic.or.at\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd","name":"Patrick Struger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e","url":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","caption":"Patrick Struger"},"sameAs":["https:\/\/www.sic.or.at"],"url":"https:\/\/sic.or.at\/en\/author\/pstruger\/"}]}},"_links":{"self":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/6862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/comments?post=6862"}],"version-history":[{"count":4,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/6862\/revisions"}],"predecessor-version":[{"id":6867,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/6862\/revisions\/6867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media\/6863"}],"wp:attachment":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media?parent=6862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/categories?post=6862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/tags?post=6862"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/coauthors?post=6862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}