{"id":2687,"date":"2019-02-26T16:08:26","date_gmt":"2019-02-26T16:08:26","guid":{"rendered":"https:\/\/www.neam.de\/?p=13287"},"modified":"2019-02-26T16:08:26","modified_gmt":"2019-02-26T16:08:26","slug":"dialog-fuer-it-sicherheit-2019","status":"publish","type":"post","link":"https:\/\/www.kai-wittenburg.de\/?p=2687","title":{"rendered":"Dialog f\u00fcr IT-Sicherheit 2019"},"content":{"rendered":"<div id=\"pl-13287\"  class=\"panel-layout\" >\n<div id=\"pg-13287-0\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-0-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-0-0-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"0\" >\n<div class=\"so-widget-sow-image so-widget-sow-image-default-bd5cd9da0588\">\n<div class=\"sow-image-container\">\n\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.neam.de\/wp-content\/uploads\/neam_sophos_dialog_fuer_it_sicherheit_2019.jpg\" width=\"600\" height=\"200\" srcset=\"https:\/\/www.neam.de\/wp-content\/uploads\/neam_sophos_dialog_fuer_it_sicherheit_2019.jpg 600w, https:\/\/www.neam.de\/wp-content\/uploads\/neam_sophos_dialog_fuer_it_sicherheit_2019-300x100.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" alt=\"Sophos Roadshow neam IT-Services GmbH\" \t\tclass=\"so-widget-image\"\/>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-13287-1\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-1-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><span style=\"color: #000000;\">Die immer h\u00e4ufiger erscheinenden Schlagzeilen \u00fcber gro\u00df angelegte Cyberattacken machen deutlich, dass sich eine verl\u00e4ssliche IT-Sicherheit fortw\u00e4hrend weiterentwickeln muss, um neue Gefahren erfolgreich abzuwehren. Denn nicht nur pers\u00f6nliche Daten, sondern vor allem die wertvollen Daten in Unternehmen stehen im Visier der Hacker und sind tagt\u00e4glich tausendfachen Angriffen ausgesetzt.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-13287-2\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-2-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><span style=\"color: #000000;\">Wir laden Sie zum<strong> Dialog f\u00fcr IT-Sicherheit<\/strong> von unserem Partner Sophos ein. Hier werden Sie \u00fcber die wichtigsten aktuellen Trends aufgekl\u00e4rt und h\u00f6ren Klartext in Sachen IT Security:<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-13287-3\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-3-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><span style=\"color: #000000;\">\u25cf\u00a0Welchen Einfluss hat k\u00fcnstliche Intelligenz?<\/span><\/p>\n<p><span style=\"color: #000000;\">\u25cf Was steckt tats\u00e4chlich hinter \u201eNext-Gen-Technologien\u201c?<\/span><\/p>\n<p><span style=\"color: #000000;\">\u25cf Wo setzen Cyberkriminelle heutzutage an?<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-13287-4\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-4-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><span style=\"color: #000000;\">Antworten auf diese Fragen und konkrete L\u00f6sungsans\u00e4tze f\u00fcr eine echte Neuaufstellung Ihrer IT-Sicherheit erhalten Sie praxisnah von Experten vorgestellt.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-13287-5\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-5-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<h3 style=\"text-align: center;\"><span style=\"color: #000000;\">Auf zum Dialog f\u00fcr IT-Sicherheit 2019<\/span><\/h3>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>06.03. Wien +++ 13.03. Z\u00fcrich +++ 02.04. Hamburg +++ 03.04. Berlin +++ 04.04. M\u00fcnchen +++ 09.04. Frankfurt +++ 10.04. K\u00f6ln <\/strong><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-13287-6\"  class=\"panel-grid panel-no-style\" >\n<div id=\"pgc-13287-6-0\"  class=\"panel-grid-cell\" >\n<div id=\"panel-13287-6-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"6\" >\n<div class=\"so-widget-sow-button so-widget-sow-button-atom-c40c9f58d5db\">\n<div class=\"ow-button-base ow-button-align-center\">\n\t<a href=\"https:\/\/events.sophos.com\/DialogfuerIT-Sicherheit2019&#038;id=98304-18827\" class=\"ow-icon-placement-left ow-button-hover\"  rel=\"noopener noreferrer\" \t\t><br \/>\n\t\t<span><\/p>\n<p>\t\t\tJetzt anmelden\t\t<\/span><br \/>\n\t<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Die immer h&auml;ufiger erscheinenden Schlagzeilen &uuml;ber gro&szlig; angelegte Cyberattacken machen deutlich, dass sich eine verl&auml;ssliche IT-Sicherheit fortw&auml;hrend weiterentwickeln muss, um neue Gefahren erfolgreich abzuwehren. Denn nicht nur pers&ouml;nliche Daten, sondern vor allem die wertvollen Daten in Unternehmen stehen im Visier der Hacker und sind tagt&auml;glich tausendfachen Angriffen ausgesetzt.<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,5,6,3,7,76,1306,4,12,17,15,1331,16,14,8],"tags":[],"class_list":["post-2687","post","type-post","status-publish","format-standard","hentry","category-blog","category-bsi","category-isms","category-isms-bsi-iso-27001","category-iso27001","category-it-sicherheit","category-neam","category-notfallmanagement","category-penetrationstest","category-penetrationstests","category-risikomanagement","category-sophos","category-unternehmen","category-veranstaltungen","category-zertifizierung-audit"],"_links":{"self":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts\/2687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2687"}],"version-history":[{"count":1,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts\/2687\/revisions"}],"predecessor-version":[{"id":2688,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=\/wp\/v2\/posts\/2687\/revisions\/2688"}],"wp:attachment":[{"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kai-wittenburg.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}