{"id":1472,"date":"2023-07-14T14:22:30","date_gmt":"2023-07-14T14:22:30","guid":{"rendered":"https:\/\/gb22.eco.de\/the-internet-security-days\/"},"modified":"2023-08-16T14:50:40","modified_gmt":"2023-08-16T14:50:40","slug":"the-internet-security-days","status":"publish","type":"page","link":"https:\/\/gb22.eco.de\/en\/events\/the-internet-security-days\/","title":{"rendered":"The Internet Security Days"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/gb22.eco.de\/en\/events\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/&#x200E;Banner.&#x200E;008-1024x179.jpeg\" alt=\"\" class=\"wp-image-809\" style=\"width:1144px;height:200px\" width=\"1144\" height=\"200\" \/><\/a><\/figure>\n\n<h1 class=\"wp-block-heading\">The Internet Security Days<\/h1>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_1.jpg\" alt=\"\" class=\"wp-image-228\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_1.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_1-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_1-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_1-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>IT security for an intensified threat situation: With around 500 participants over two days, the 12th Internet Security Days (ISDs) at Phantasialand Br\u00fchl were a huge success.<\/p>\n\n\n\n<p>On the morning of 29 September, the sun was shining above Phantasialand, and the participants were all aglow: The joy of finally having the largest IT security conference back as a live event could be read from everyone\u2019s faces. IT experts from all over Germany came to Br\u00fchl to exchange views on IT security challenges and to cultivate old and new contacts. The eco Association of the Internet Industry organises the conference annually in cooperation with the heise Academy at Phantasialand Br\u00fchl.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>The topic of IT security is red-hot in autumn 2022, as the Ukraine conflict and economically motivated attacks with extortion Trojans (ransomware) threaten SMEs as well as public authorities to an unprecedented degree.<\/p>\n\n\n\n<p>Prof. Norbert Pohlmann addressed this situation in his welcome address. The eco Board Member for IT Security emphasised that the need for a close personal exchange is greater than ever: \u201cIT systems and infrastructures are not designed, built, configured and updated securely enough to withstand all intelligent attacks,\u201d he acknowledged. Afterwards, Frank Rock, District Administrator of the Rhein-Erft district, gave a welcoming address.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_2.jpg\" alt=\"\" class=\"wp-image-229\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_2.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_2-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_2-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_2-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\"><strong>IT security champions avoid damage<\/strong><\/h2>\n\n<p>Around forty renowned experts then brought up IT security topic in panel discussions. Paul Kaffsack (Myra Security) and Christian Knothe (1&amp;1 Versatel) kicked things off with their keynote. They provided strong arguments and strategies for IT security based on European protection solutions. \u201cTake advantage of the opportunities offered by local service providers and European hidden champions,\u201d said Paul Kaffsack. The aim is to reduce potential attack areas and risks in order to avoid any damage. Thorsten Deutrich (GlobalDots) discussed the automation of cyber defence and presented vulnerability scanning, a real-time check of data points and other new protection tools.<\/p>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Detecting fake images is becoming increasingly difficult; even many videos, for example, can only be unmasked as fake with the help of forensic methods. Such deep fakes are used by cybercriminals for CEO fraud attacks, which can cause damage in the millions, as reported by Dr. Christian Kr\u00e4tzer from the Faculty of Computer Science at Otto von Guericke University Magdeburg. He spoke about \u201cthe role of AI in modern attack vectors as well as methods of IT security.\u201d The material for creating deep fakes of a target person is freely available online, and the creation is comparatively cheap.<\/p>\n\n\n\n<p>At the ISDs, regular breaks gave the participants enough space for networking and refreshment \u2013 for example at the espresso and candy bar, which were open to all guests with the support of LastPass.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_3.jpg\" alt=\"\" class=\"wp-image-232\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_3.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_3-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_3-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_3-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Do not pay a ransom to cybercriminals<\/strong><\/h2>\n\n<p>Information Security in Industry \u2013 The Next Must-Have? This was the question posed by G\u00f6khan Kurtbay (CNX Consulting Partners). The reputation of German SMEs in terms of cybersecurity is poor, he pointed out. With due cause, he says, as many of those responsible display a dangerous degree of ignorance. He expects that there will soon be more legal requirements for IT security in companies.<\/p>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>The cyber attack on the district of Anhalt-Bitterfeld showed how quickly it can affect public authorities. abine Griebsch (CDO in the Anhalt-Bitterfeld district) mentioned this in her presentation: \u201cWe need to create appropriate standards and the foundations to prevent attacks in order to ensure a sustainable level of protection\u201d. A close exchange regarding procedures is necessary. Victims of cybercriminals should not pay ransom: this was advised by Chris Lichtenth\u00e4ler and Melanie Vorderobermeier, both from Deloitte, in their presentation entitled \u201cThe invisible hand in cyberspace\u201d. In the subsequent \u201cWar Stories\u201d panel, participants shared their experiences of dealing with a recent incident.<\/p>\n\n\n\n<p>\u201cSecurity Everywhere\u201d was what was called for by Andreas M\u00fcnch from Akamai in his presentation: \u201cWith the help of artificial intelligence, we recognise patterns and can thus ward off DDoS attacks.\u201d Before the lunch break, eco Managing Director Alexander Rabe congratulated long-standing eco member companies. Certificates for 25 years of membership in the eco Association were presented to Microsoft Deutschland GmbH and CANCOM Managed Services GmbH. HKN GmbH, FreiNet GmbH and mediaBEAM GmbH were honoured for their 15 years of eco membership.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_4.jpg\" alt=\"\" class=\"wp-image-233\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_4.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_4-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_4-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_4-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Prepare for IT crises now<\/strong><\/h2>\n\n<p>Snehal Antani, CEO of the sponsor HORIZON3.ai, opened the second half of the day with a keynote on \u201cSOC (Security Operations Center) Effectiveness\u201d. \u201cStrengthen your security systems by finding and eliminating attack vectors before criminals can exploit them,\u201d he urged. He gave tips on how to log the right data, how to fix vulnerabilities and how to configure tools optimally.<\/p>\n\n<p>\u201cThe interior of the IoT product defines your cybersecurity,\u201d said Mirko Ross of asvin GmbH. In his presentation, he highlighted European regulations to which the industry must adapt. Things will change drastically in terms of IoT security, he predicted: \u201cOnly regulation can fix the problem, the industry alone can\u2019t do it.\u201d<\/p>\n\n<p>Kai Boyd from Fastly presented new rules for web app and API security that can be used to defend against cybersecurity threats more effectively. Martin Meyer from Rubrik Germany GmbH explained how AI helps to identify and contain risks in the fight against ransomware. He also shared valuable tips on the subject of backups, which should be logically isolated from the network and secured by multi-factor authentication.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Networking at the Internet Security Night<\/strong><\/h2>\n\n<p>\u201cIoT devices are increasingly becoming a potential target for hackers,\u201d said Tatjana Hein from eco Association, in the afternoon panel discussion. She joined the panel by Olaf Pursche (AV-Test), Rainer M. Richter (HORIZON3.ai) and Paul Trinks (German Federal Office for Information Security (BSI)). They all shared advice on how to defend against cyber attacks on vulnerabilities that abound on the Internet of Things (IoT) due to different operating systems and standards.<\/p>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>At the end of the first day of the conference, Hauke Gierow from PIABO PR pointed out the communication requirements in the event of a crisis. \u201cCrisis communication skills must be ensured in advance,\u201d he cautioned in his presentation and commented on how companies should prepare communication now in the event of a cybersecurity emergency.<\/p>\n\n\n\n<p>On the evening of the first conference day, the Internet Security Night 2022, sponsored by Rubrik Germany GmbH, was an exceptional networking event on the agenda. In Phantasialand\u2019s \u201cDeep in Africa\u201d themescape, drum groups and an acoustic duo gave the guests a warm welcome. Afterwards, the Black Mamba, one of Phantasialand\u2019s main attractions, opened exclusively for ISD visitors, with the support of the sponsor Fastly. A number of guests did one round after another on the fast roller coaster. During the event, a rich buffet of fine African cuisine was served. Many guests were still in a celebratory mood after the long conference day and enjoyed the DJ and dance floor. The evening ended with networking and sharing experiences at the hotel bar.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_5.jpg\" alt=\"\" class=\"wp-image-234\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_5.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_5-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_5-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_5-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Day 2: Increasing trust in digitalisation<\/strong><\/h2>\n\n<p>No matter how late it got for individuals at the Internet Security Night, everyone was back on-site at 9 a.m. for the opening of the second day of the conference at Phantasialand\u2019s Quantum conference centre. \u201cWe don\u2019t have a deficit of measures in terms of IT security in Germany, but a deficit of implementation,\u201d said Dr. Dirk H\u00e4ger (BSI) in his keynote speech. H\u00e4ger urged that cybersecurity must a matter for the managers and gave an overview of the current threat situation.<\/p>\n\n<p>This was followed by presentations and discussions on \u201cIn the beginning was security \u2013 A pipe dream?\u201d and \u201cTrust on the Internet \u2013 Trust me if you can\u201d \u2013 the titles of the two parallel lecture tracks.<\/p>\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Markus Schaffrin (eco) and Frank Schmeiler (techconsult) talked about the contribution digital identities make to strengthening trust on the Internet. Both presented the results of the study \u201cSecurity &amp; digital identities in a digitalised world\u201d, which techconsult and eco had published in the spring of 2022. \u201cDigital identities are drivers of digitalisation,\u201d said Frank Schmeiler. \u201cHowever, companies and the public sector have many challenges to overcome along the way.\u201d<\/p>\n\n\n\n<p>Afterwards, Dr. Boris Hemkemeier from Commerzbank gave examples of storytelling concerning cyber attacks on bank customers. He gave an overview of how attackers use plausible stories to convince customers to send them money voluntarily. \u201cThe better the story, the more willing people are to disclose critical information,\u201d Hemkemeier said.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_6.jpg\" alt=\"\" class=\"wp-image-235\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_6.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_6-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_6-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/ISD22_6-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Human safety factor<\/strong><\/h2>\n\n<p>\u201cStorytelling is also important for security topics,\u201d Marcus Beyer (Swisscom Trust Services AG) confirmed later. He promoted a greater understanding of the human factor in cybersecurity: \u201cPeople are and will remain the number one target, so employee\u2019s sensitisation must rock!\u201d he urged.<\/p>\n\n<p>Later in the morning, resilience for IT infrastructures took centre stage for a follow-on panel. Where are we heading? Moderated by Philipp Ehmann (eco), this was the question addressed by Klaus Landefeld (eco), Thomas Niessen (Trusted Cloud) and Steve Ritter (BSI). They discussed possibilities and opportunities for improving resilience in the digital space.<\/p>\n\n<p>Two presentations by sponsors rounded off the morning: Michael Veit from Sophos acknowledged strategies to proactively detect potential threats in order to nip cyber attacks in the bud as directly as possible. Dr. Michael Lemke from Huawei Germany, meanwhile, took a look at the overall picture of cybersecurity with a focus on cloud technologies.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Digital responsibility and the hacker perspective<\/strong><\/h2>\n\n<p>What points of reference do we have for trust in the digital space? This was the question raised by Vivien Witt (eco), Andreas Weiss (eco), Ralf Benzm\u00fcller (G Data) and Jutta Juliane Meier (Identity Valley) in the afternoon. Together they presented the Digital Responsibility Goals \u2013 formulations that are intended to serve as guard rails for the responsible use of innovative technologies. \u201cWe have formulated measurable goals for trustworthy and responsible interaction in the digital world,\u201d said Jutta Juliane Meier.<\/p>\n\n<p>The second day of the conference ended with a keynote by hacker Felix FX Lindner, who didn\u2019t mince his words in his assessment of the IT security situation: \u201cWe haven\u2019t figured out how to build bug-free software yet,\u201d he said at the conclusion of ISDs 2022. Further exchange is therefore necessary and important, which is why the organisers immediately announced that the ISDs will take place again in 2023. Markus Schaffrin concluded the conference by thanking all participants and the sponsors Myra, Horizon3.ai, Akamai Technologies, Fastly, GlobalDots, Sophos, LastPass, Rubrik, Huawei &amp; P3KI GmbH: We are looking forward to ISD 2023.<\/p>\n\n<p>See more images in our <a href=\"https:\/\/www.flickr.com\/photos\/ecoev\/albums\/72177720302634283\">photo album<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet Security Days IT security for an intensified threat situation: With around 500 participants over two days, the 12th Internet Security Days (ISDs) at Phantasialand Br\u00fchl were a huge success. On the morning of 29 September, the sun was shining above Phantasialand, and the participants were all aglow: The&#8230;<a class=\"eco-loop-button\" href=\"https:\/\/gb22.eco.de\/en\/events\/the-internet-security-days\/\">Read More<\/a><\/p>\n","protected":false},"author":20,"featured_media":0,"parent":1482,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1472","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Internet Security Days - eco Gesch\u00e4ftsbericht 2022<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Internet Security Days - eco Gesch\u00e4ftsbericht 2022\" \/>\n<meta property=\"og:description\" content=\"The Internet Security Days IT security for an intensified threat situation: With around 500 participants over two days, the 12th Internet Security Days (ISDs) at Phantasialand Br\u00fchl were a huge success. On the morning of 29 September, the sun was shining above Phantasialand, and the participants were all aglow: The...Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/\" \/>\n<meta property=\"og:site_name\" content=\"eco Gesch\u00e4ftsbericht 2022\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T14:50:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/&#x200E;Banner.&#x200E;008-1024x179.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/\",\"url\":\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/\",\"name\":\"The Internet Security Days - eco Gesch\u00e4ftsbericht 2022\",\"isPartOf\":{\"@id\":\"https:\/\/gb22.eco.de\/#website\"},\"datePublished\":\"2023-07-14T14:22:30+00:00\",\"dateModified\":\"2023-08-16T14:50:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gb22.eco.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Internet Security Days\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gb22.eco.de\/#website\",\"url\":\"https:\/\/gb22.eco.de\/\",\"name\":\"eco Gesch\u00e4ftsbericht 2022\",\"description\":\"Gesch\u00e4ftsbericht 2022\",\"publisher\":{\"@id\":\"https:\/\/gb22.eco.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gb22.eco.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gb22.eco.de\/#organization\",\"name\":\"eco Gesch\u00e4ftsbericht 2022\",\"url\":\"https:\/\/gb22.eco.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg\",\"contentUrl\":\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg\",\"caption\":\"eco Gesch\u00e4ftsbericht 2022\"},\"image\":{\"@id\":\"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Internet Security Days - eco Gesch\u00e4ftsbericht 2022","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/","og_locale":"en_US","og_type":"article","og_title":"The Internet Security Days - eco Gesch\u00e4ftsbericht 2022","og_description":"The Internet Security Days IT security for an intensified threat situation: With around 500 participants over two days, the 12th Internet Security Days (ISDs) at Phantasialand Br\u00fchl were a huge success. On the morning of 29 September, the sun was shining above Phantasialand, and the participants were all aglow: The...Read More","og_url":"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/","og_site_name":"eco Gesch\u00e4ftsbericht 2022","article_modified_time":"2023-08-16T14:50:40+00:00","og_image":[{"url":"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/&#x200E;Banner.&#x200E;008-1024x179.jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/","url":"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/","name":"The Internet Security Days - eco Gesch\u00e4ftsbericht 2022","isPartOf":{"@id":"https:\/\/gb22.eco.de\/#website"},"datePublished":"2023-07-14T14:22:30+00:00","dateModified":"2023-08-16T14:50:40+00:00","breadcrumb":{"@id":"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gb22.eco.de\/en\/the-internet-security-days\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gb22.eco.de\/en\/the-internet-security-days\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gb22.eco.de\/en\/"},{"@type":"ListItem","position":2,"name":"The Internet Security Days"}]},{"@type":"WebSite","@id":"https:\/\/gb22.eco.de\/#website","url":"https:\/\/gb22.eco.de\/","name":"eco Gesch\u00e4ftsbericht 2022","description":"Gesch\u00e4ftsbericht 2022","publisher":{"@id":"https:\/\/gb22.eco.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gb22.eco.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gb22.eco.de\/#organization","name":"eco Gesch\u00e4ftsbericht 2022","url":"https:\/\/gb22.eco.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/","url":"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg","contentUrl":"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg","caption":"eco Gesch\u00e4ftsbericht 2022"},"image":{"@id":"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/comments?post=1472"}],"version-history":[{"count":2,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1472\/revisions"}],"predecessor-version":[{"id":1476,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1472\/revisions\/1476"}],"up":[{"embeddable":true,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1482"}],"wp:attachment":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/media?parent=1472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}