{"id":7446,"date":"2022-11-02T12:40:06","date_gmt":"2022-11-02T11:40:06","guid":{"rendered":"https:\/\/sic.or.at\/en\/?p=7446"},"modified":"2022-11-07T11:32:38","modified_gmt":"2022-11-07T10:32:38","slug":"cyber-security-night-vi","status":"publish","type":"post","link":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/","title":{"rendered":"Cyber Security Night VI"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]<strong>From virtual threat to real danger \u2013 on November 15th, 2022 in MAKERSPACE Carinthia everything revolves around security on the internet. Already in the 6th edition of the annual event of the ExpertsGroup IT Security and the KS\u00d6 K\u00e4rnten, this time it is specifically about hacker attacks.<\/strong><\/p>\n<hr \/>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h3>Hacker Attack: From Virtual Threat to Real Danger<\/h3>\n<p>This year, the <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/ExpertsGroup-IT-Security-Berater.html\" target=\"_blank\" rel=\"noopener\">ExpertsGroup IT Security<\/a><\/strong> and the <strong><a href=\"https:\/\/kompetenzzentrum-sicheres-oesterreich.at\/\" target=\"_blank\" rel=\"noopener\">KS\u00d6 K\u00e4rnten<\/a><\/strong>, together with representatives of the <strong>LKA<\/strong> and <strong>BMI<\/strong>, have taken up the current topic of hacker attacks. The <em>investigations focus on malware<\/em>, <em>police investigations after cyber attacks<\/em> and <em>weak points in the company<\/em>. <em>&#8220;We serve specific instructions on how to deal with cybercrime and show how you can best protect your company from attacks&#8221;<\/em>, says <strong>Holger Schmitz<\/strong>.<\/p>\n<h2>Cyber Security Night VI<\/h2>\n<p><strong>When:<\/strong> Tuesday, 15th November 2022, 5 p.m.<br \/>\n<strong>Where:<\/strong>\u00a0<strong><a href=\"https:\/\/www.makerspace-carinthia.com\/\" target=\"_blank\" rel=\"noopener\">Makerspace Carinthia<\/a><\/strong>, Lastenstra\u00dfe 26, Klagenfurt a. W.<br \/>\n<strong>Moderation:<\/strong> Holger Schmitz, Head of UBIT Expert Group IT-Security of the Carinthian CoC[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/3&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7447&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][vc_column_text]Holger Schmitz \u2013 speaker for the <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/ExpertsGroup-IT-Security-Berater.html\" target=\"_blank\" rel=\"noopener\">ExpertsGroup IT Security<\/a><\/strong> and head of the <strong><a href=\"https:\/\/sic.or.at\/die-thementreiber\/\" target=\"_blank\" rel=\"noopener\">Focus Group for IT Security<\/a><\/strong> in the Software Internet Cluster[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;Accent-Color&#8221; direction=&#8221;vertical&#8221; icon_size=&#8221;medium&#8221; icon_style=&#8221;border&#8221;][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1667817156249-7&#8243; tab_id=&#8221;1667817156250-8&#8243; icon_fontawesome=&#8221;fa fa-shield&#8221;]\n<h4>State Criminal Police Office (LKA) Carinthia,<\/h4>\n<p>with Head of CI <strong>Christian BAUMGARTNER<\/strong><\/p>\n<p>Get an overview of current cybercrime developments and current threats &#8211; keyword ransomware &#8211; and how you can best deal with it as an affected company.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1667817156283-4&#8243; tab_id=&#8221;1667817156284-9&#8243; icon_fontawesome=&#8221;fa fa-puzzle-piece&#8221;]\n<h4>Directorate for State Security and Intelligence, Cyber Security and Technical Infrastructure<\/h4>\n<p>with department manager <strong>DI Christina SCHINDLAUER<\/strong><\/p>\n<p>Find out about the responsibilities of the authorities\/BMI, the course of investigations and receive specific recommendations for action to ensure correct preservation of evidence.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1667817156306-7&#8243; tab_id=&#8221;1667817156307-10&#8243; icon_fontawesome=&#8221;fa fa-user-secret&#8221;]\n<h4>UBIT-ExpertsGroup &#8220;IT-Security&#8221; of the Carinthian Chamber of Commerce<\/h4>\n<p>with Managing Director of EPEIOS-SEC, <strong>Markus LEEB<\/strong><\/p>\n<p>Practical LIVE demonstration: How hackers get into the system &#8211;<br \/>\nAccount and password vulnerabilities.[\/nectar_icon_list_item][\/nectar_icon_list][divider line_type=&#8221;No Line&#8221;][divider line_type=&#8221;No Line&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;see-through-2&#8243; hover_color_override=&#8221;#000000&#8243; hover_text_color_override=&#8221;#ffffff&#8221; icon_family=&#8221;default_arrow&#8221; text=&#8221;Show Program&#8221; url=&#8221;https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/CSN2022-Einladung-A4_Low.pdf&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h2>JOIN US!<\/h2>\n<p>Find out more at the <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/6.-Cyber-Security-Night.html\" target=\"_blank\" rel=\"noopener\">Cyber Security Night<\/a><\/strong> and get an overview of current developments and practical recommendations for action so that you can be sure that you are safe!<\/p>\n<p><strong>Participation is free!<\/strong>[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;default_arrow&#8221; text=&#8221;Register Now&#8221; url=&#8221;https:\/\/events.wkk.or.at\/d7737489-d33f-ed11-96b9-5e2e658ba3ee\/Home\/Index&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":9,"featured_media":7448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"coauthors":[78],"class_list":{"0":"post-7446","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Night VI - SIC (EN)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Night VI - SIC (EN)\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/\" \/>\n<meta property=\"og:site_name\" content=\"SIC (EN)\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-02T11:40:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-07T10:32:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Struger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Struger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/\",\"url\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/\",\"name\":\"Cyber Security Night VI - SIC (EN)\",\"isPartOf\":{\"@id\":\"https:\/\/sic.or.at\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg\",\"datePublished\":\"2022-11-02T11:40:06+00:00\",\"dateModified\":\"2022-11-07T10:32:38+00:00\",\"author\":{\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\"},\"breadcrumb\":{\"@id\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#primaryimage\",\"url\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg\",\"contentUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sic.or.at\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Night VI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sic.or.at\/en\/#website\",\"url\":\"https:\/\/sic.or.at\/en\/\",\"name\":\"SIC (EN)\",\"description\":\"Software Internet Cluster\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sic.or.at\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\",\"name\":\"Patrick Struger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"caption\":\"Patrick Struger\"},\"sameAs\":[\"https:\/\/www.sic.or.at\"],\"url\":\"https:\/\/sic.or.at\/en\/author\/pstruger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Night VI - SIC (EN)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Night VI - SIC (EN)","og_description":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...","og_url":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/","og_site_name":"SIC (EN)","article_published_time":"2022-11-02T11:40:06+00:00","article_modified_time":"2022-11-07T10:32:38+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg","type":"image\/jpeg"}],"author":"Patrick Struger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Struger","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/","url":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/","name":"Cyber Security Night VI - SIC (EN)","isPartOf":{"@id":"https:\/\/sic.or.at\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#primaryimage"},"image":{"@id":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#primaryimage"},"thumbnailUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg","datePublished":"2022-11-02T11:40:06+00:00","dateModified":"2022-11-07T10:32:38+00:00","author":{"@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd"},"breadcrumb":{"@id":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sic.or.at\/en\/cyber-security-night-vi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#primaryimage","url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg","contentUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/10\/csn_22_post_en.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/sic.or.at\/en\/cyber-security-night-vi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sic.or.at\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Night VI"}]},{"@type":"WebSite","@id":"https:\/\/sic.or.at\/en\/#website","url":"https:\/\/sic.or.at\/en\/","name":"SIC (EN)","description":"Software Internet Cluster","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sic.or.at\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd","name":"Patrick Struger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e","url":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","caption":"Patrick Struger"},"sameAs":["https:\/\/www.sic.or.at"],"url":"https:\/\/sic.or.at\/en\/author\/pstruger\/"}]}},"_links":{"self":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/comments?post=7446"}],"version-history":[{"count":7,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7446\/revisions"}],"predecessor-version":[{"id":7486,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7446\/revisions\/7486"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media\/7448"}],"wp:attachment":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media?parent=7446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/categories?post=7446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/tags?post=7446"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/coauthors?post=7446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}