{"id":7489,"date":"2022-11-17T15:01:29","date_gmt":"2022-11-17T14:01:29","guid":{"rendered":"https:\/\/sic.or.at\/en\/?p=7489"},"modified":"2022-11-17T15:11:38","modified_gmt":"2022-11-17T14:11:38","slug":"review-cyber-security-night-2022","status":"publish","type":"post","link":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/","title":{"rendered":"Review &#8211; Cyber Security Night 2022"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]<strong>Hacker Attack: From Virtual Threat to Real Danger. On November 15th, the WK Expert Group UBIT, with partners such as the Carinthian Police Department, the KS\u00d6 and the State of Carinthia, organized their annual main event for the 6th time on the topics of data protection, weak points in IT networks and security in the network.<\/strong><\/p>\n<hr \/>\n<p>Cybercrime has become a mass phenomenon. This was also shown by the great interest in the <strong>Cyber Security Night<\/strong> of the <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/ExpertsGroup-IT-Security-Berater.html\" target=\"_blank\" rel=\"noopener\">WK Expert Group UBIT<\/a><\/strong> in Makerspace Carinthia. Exchanged account data on the bill, hours of calls to Chile over the telephone system, blackmail emails to customers, ID cards on the dark web and bitcoin demands on the black screen &#8211; all of these cyber attacks have already cost Carinthian companies quite a bit of money.<\/p>\n<h1>Cyber Security Night 2022<\/h1>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_video link=&#8221;https:\/\/youtu.be\/Lvk2WpAj65w&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Cyber Security Night &#8211; Opening<\/h3>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7498&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]At the entrance to <strong><a href=\"https:\/\/www.makerspace-carinthia.com\/\" target=\"_blank\" rel=\"noopener\">MAKERSPACE Carinthia<\/a><\/strong> on <strong>November 15th<\/strong> at around <strong>5:00 p.m.<\/strong> it became clear &#8211; safety is the top priority here. The participants were welcomed through a corridor consisting of numerous blue uniforms &#8211; well protected.<\/p>\n<p>The event was opened by <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/ExpertsGroup-IT-Security-Berater.html\" target=\"_blank\" rel=\"noopener\">IT Security Expert Group<\/a><\/strong> spokesman and <strong><a href=\"https:\/\/sic.or.at\/en\/focusgroups\/\" target=\"_blank\" rel=\"noopener\">SIC Focus Group Leader<\/a><\/strong> <strong>Holger Schmitz<\/strong>, who also hosted the event as an IT expert. In the course of the opening ceremony, President of the Chamber of Commerce <strong>J\u00fcrgen Mandl<\/strong>, Provincial Councilor <strong>Sebastian Schuschnig<\/strong> and Chairman of the UBIT Expert Group <strong>Martin Zandonella<\/strong> shared their experiences and assessments of cybercrime in the technical and economic environment.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]From 2020 to 2021 alone, incidents involving ransomware doubled in Austria. <em>&#8220;This is an extremely challenging development for the economy and we have to learn how to deal with these new dangers,&#8221;<\/em> says CoC President <strong>J\u00fcrgen Mandl<\/strong>. The <span style=\"color: #ffcc00;\"><strong>Cyber Security Night<\/strong><\/span> creates awareness of the dangers and shows loopholes for hackers.<\/p>\n<p>Major General <strong>Wolfgang Rauchegger<\/strong> from the <strong><a href=\"https:\/\/www.polizei.gv.at\/ktn\/lpd\/start.aspx\" target=\"_blank\" rel=\"noopener\">Carinthian State Police Headquarters<\/a><\/strong> reported that in Carinthia a lot is being invested in crime prevention and in crime fighting and digital forensics.<\/p>\n<blockquote><p>Digitization has changed criminals and police work. Specially trained &#8220;Cybercops&#8221; take care of law enforcement and follow even the smallest digital traces.<\/p><\/blockquote>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7506&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][vc_column_text]f.l.: Chairman of the UBIT Expert Group <strong>Martin Zandonella<\/strong>, President of the Chamber of Commerce <strong>J\u00fcrgen Mandl<\/strong>, Major General <strong>Wolfgang Rauchegger<\/strong> and Provincial Councilor <strong>Sebastian Schuschnig<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Cyber Security affects Everyone<\/h3>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/3&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7497&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/3&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7501&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/3&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]The size of the company is no longer relevant for hackers. One-person businesses and smaller businesses are now also being attacked. <strong>CI Christian Baumgartner<\/strong> from the <strong><a href=\"https:\/\/www.polizei.gv.at\/ktn\/lpd\/organigramm\/lva.aspx\" target=\"_blank\" rel=\"noopener\">Carinthia State Criminal Police Office<\/a><\/strong>, <strong>DI Christina Schindlauer<\/strong> from the <strong><a href=\"https:\/\/www.bmi.gv.at\/\" target=\"_blank\" rel=\"noopener\">Federal Ministry of the Interior<\/a><\/strong>, and <strong>Holger Schmitz<\/strong> and <strong>Markus Leeb<\/strong> from the <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/ExpertsGroup-IT-Security-Berater.html\" target=\"_blank\" rel=\"noopener\">Expert Group IT-Security<\/a><\/strong> shared tips on how to protect yourself and your business.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Personal Experiences with Cybercrime<\/h3>\n<p>Data protection and IT security affects everyone and should not be a taboo subject. Cyber security is also not a one-off investment, but an ongoing process called monitoring.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_video link=&#8221;https:\/\/youtu.be\/lMoOZoy9kfA&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Use offers of the CoC!<\/h3>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7517&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;3\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Funding model \u2013 &#8220;Start with Security&#8221;<\/h4>\n<p>As part of the low-threshold funding model, entrepreneurs have the opportunity, in cooperation with <strong><a href=\"https:\/\/www.wko.at\/branchen\/k\/information-consulting\/unternehmensberatung-buchhaltung-informationstechnologie\/ExpertsGroup-IT-Security-Berater.html\" target=\"_blank\" rel=\"noopener\">UBIT Service Providers and Consultants from the IT Security Expert Group<\/a><\/strong>, to apply for <em>funding for investments, advice and training for employees in the field of IT security<\/em>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7518&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;3\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Cyber Security Hotline<\/h4>\n<p>Fast help if the worst comes to the worst: The Carinthian Chamber of Commerce has set up its own <em>emergency hotline for companies affected by cybercrime<\/em> and <em>IT Security Experts are available with advice and action<\/em>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7519&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;3\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4>Online Advisory: IT-SAFE<\/h4>\n<p>Here you will find all information on S<em>ME cybersecurity funding, guides, checklists and current information on the subject of cybersecurity in companies<\/em>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Visual impressions of the CSN VI<\/h3>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_gallery type=&#8221;nectarslider_style&#8221; images=&#8221;7512,7501,7497,7511,7504,7509,7508,7494,7507,7499,7498,7506,7505,7510,7503,7502,7500&#8243; image_loading=&#8221;default&#8221; flexible_slider_height=&#8221;true&#8221; bullet_navigation_style=&#8221;see_through&#8221; onclick=&#8221;link_no&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]Press Photos: <strong>HELGE BAUER<\/strong><br \/>\n<a href=\"https:\/\/www.helgebauer.at\/\" target=\"_blank\" rel=\"noopener\">Helge Bauer &#8211; Photographer<\/a>[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_column_text]We would like to thank the organizers and all participants for the great and informative event and are already looking forward to the next edition of the Cyber Security Night. A visual summary of the CSN 22 will also be available in the <a href=\"https:\/\/www.kt1.at\/\" target=\"_blank\" rel=\"noopener\">KT1 media library<\/a> soon!<\/p>\n<p><strong>Your Community for IT Experts!<\/strong>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":9,"featured_media":7494,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"coauthors":[78],"class_list":{"0":"post-7489","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Review - Cyber Security Night 2022 - SIC (EN)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review - Cyber Security Night 2022 - SIC (EN)\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"SIC (EN)\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T14:01:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-17T14:11:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Struger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Struger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/\",\"url\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/\",\"name\":\"Review - Cyber Security Night 2022 - SIC (EN)\",\"isPartOf\":{\"@id\":\"https:\/\/sic.or.at\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg\",\"datePublished\":\"2022-11-17T14:01:29+00:00\",\"dateModified\":\"2022-11-17T14:11:38+00:00\",\"author\":{\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\"},\"breadcrumb\":{\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#primaryimage\",\"url\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg\",\"contentUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sic.or.at\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Review &#8211; Cyber Security Night 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sic.or.at\/en\/#website\",\"url\":\"https:\/\/sic.or.at\/en\/\",\"name\":\"SIC (EN)\",\"description\":\"Software Internet Cluster\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sic.or.at\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\",\"name\":\"Patrick Struger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"caption\":\"Patrick Struger\"},\"sameAs\":[\"https:\/\/www.sic.or.at\"],\"url\":\"https:\/\/sic.or.at\/en\/author\/pstruger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review - Cyber Security Night 2022 - SIC (EN)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/","og_locale":"en_US","og_type":"article","og_title":"Review - Cyber Security Night 2022 - SIC (EN)","og_description":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...","og_url":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/","og_site_name":"SIC (EN)","article_published_time":"2022-11-17T14:01:29+00:00","article_modified_time":"2022-11-17T14:11:38+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg","type":"image\/jpeg"}],"author":"Patrick Struger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Struger","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/","url":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/","name":"Review - Cyber Security Night 2022 - SIC (EN)","isPartOf":{"@id":"https:\/\/sic.or.at\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#primaryimage"},"image":{"@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg","datePublished":"2022-11-17T14:01:29+00:00","dateModified":"2022-11-17T14:11:38+00:00","author":{"@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd"},"breadcrumb":{"@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#primaryimage","url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg","contentUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/11\/csn_22_post_en-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/sic.or.at\/en\/review-cyber-security-night-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sic.or.at\/en\/"},{"@type":"ListItem","position":2,"name":"Review &#8211; Cyber Security Night 2022"}]},{"@type":"WebSite","@id":"https:\/\/sic.or.at\/en\/#website","url":"https:\/\/sic.or.at\/en\/","name":"SIC (EN)","description":"Software Internet Cluster","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sic.or.at\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd","name":"Patrick Struger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e","url":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","caption":"Patrick Struger"},"sameAs":["https:\/\/www.sic.or.at"],"url":"https:\/\/sic.or.at\/en\/author\/pstruger\/"}]}},"_links":{"self":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/comments?post=7489"}],"version-history":[{"count":10,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7489\/revisions"}],"predecessor-version":[{"id":7524,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7489\/revisions\/7524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media\/7494"}],"wp:attachment":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media?parent=7489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/categories?post=7489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/tags?post=7489"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/coauthors?post=7489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}