{"id":13,"date":"2024-10-11T08:55:11","date_gmt":"2024-10-11T08:55:11","guid":{"rendered":"https:\/\/security-summits.de\/?page_id=13"},"modified":"2025-06-13T10:43:39","modified_gmt":"2025-06-13T10:43:39","slug":"start","status":"publish","type":"page","link":"https:\/\/security-summits.de\/","title":{"rendered":"Start"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Header&#8220; _builder_version=&#8220;4.27.4&#8243; background_color=&#8220;#0C71C3&#8243; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_type=&#8220;circular&#8220; background_color_gradient_direction_radial=&#8220;top right&#8220; background_color_gradient_stops=&#8220;#24a9e6 0%|#002672 100%&#8220; background_color_gradient_start=&#8220;#00ffd8&#8243; background_color_gradient_end=&#8220;#0029e2&#8243; background_image=&#8220;https:\/\/security-summits.de\/wp-content\/uploads\/2024\/10\/cyber-security-17.png&#8220; custom_padding=&#8220;10vw|19px|18px|16px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.27.4&#8243; z_index=&#8220;1&#8243; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;-101px|729px||731px||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text admin_label=&#8220;Text&#8220; _builder_version=&#8220;4.27.4&#8243; text_font=&#8220;||||||||&#8220; text_font_size=&#8220;12px&#8220; header_font=&#8220;Overpass|900|||||||&#8220; header_font_size=&#8220;84px&#8220; transform_scale=&#8220;89%|89%&#8220; transform_translate=&#8220;-58px|13px&#8220; background_layout=&#8220;dark&#8220; width=&#8220;118.5%&#8220; height=&#8220;525px&#8220; custom_margin=&#8220;|-136px|30px|||&#8220; custom_padding=&#8220;|35px|0px|35px||true&#8220; header_font_size_tablet=&#8220;54px&#8220; header_font_size_phone=&#8220;32px&#8220; header_font_size_last_edited=&#8220;on|desktop&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>IT-Sicherheit Summits 2025<\/h1>\n<p style=\"text-align: left;\"><span style=\"font-size: large; font-family: inherit;\">Erleben Sie die neuesten Trends, Expertenwissen und Best Practices rund um <strong>Cybersecurity<\/strong> und <strong>Kritische Infrastrukturen (KRITIS)<\/strong>. Die IT-Sicherheit Summits 2025 bieten Ihnen <strong data-start=\"461\" data-end=\"490\">kostenlose Webkonferenzen<\/strong> mit f\u00fchrenden Experten aus Wirtschaft, Forschung und Beh\u00f6rden. Nutzen Sie die Gelegenheit, um aktuelle <strong data-start=\"594\" data-end=\"683\">Cybersecurity-Trends, regulatorische Anforderungen und innovative Sicherheitsl\u00f6sungen<\/strong> kennenzulernen.netzen. <\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-size: large; font-family: inherit;\">Unsere <strong data-start=\"710\" data-end=\"753\">vier spezialisierten Online-Konferenzen<\/strong> bieten tiefgehende Einblicke in <strong data-start=\"786\" data-end=\"866\">Cybersecurity, KRITIS, NIS 2, OT-Security und moderne IT-Sicherheitsl\u00f6sungen<\/strong>.<\/span><\/p>\n<p><span style=\"font-size: large; font-family: inherit;\">\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-size: large; font-family: inherit;\">Exklusive Expertenvortr\u00e4ge<\/span><\/li>\n<li><span style=\"font-size: large; font-family: inherit;\">Aktuelle Cybersecurity-Trends<\/span><\/li>\n<li><span style=\"font-size: large; font-family: inherit;\">Networking-M\u00f6glichkeiten<\/span><\/li>\n<li><span style=\"font-size: large; font-family: inherit;\">Best Practices<\/span><\/li>\n<li><span style=\"font-family: inherit; font-size: large;\">\u00a0Strategien f\u00fcr Unternehmen und KRITIS-Betreibe<\/span><\/li>\n<li><span style=\"font-family: inherit; font-size: large;\">Kompakte Wissensvermittlung in interaktiven Sessions<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;RGBA(255,255,255,0)&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_cta title=&#8220;4. Cybersecurity |KRITIS | NIS 2&#8243; button_text=&#8220;Click Here&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;|700||on|||||&#8220; header_text_color=&#8220;#00325f&#8220; header_font_size=&#8220;23px&#8220; body_text_color=&#8220;#00325f&#8220; background_color=&#8220;#FFFFFF&#8220; background_layout=&#8220;light&#8220; custom_padding=&#8220;|||40px||&#8220; animation_style=&#8220;zoom&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><strong>07.- 08.05.2025\u00a0<\/strong><\/p>\n<p data-start=\"173\" data-end=\"379\" style=\"text-align: justify;\">Die <strong data-start=\"1354\" data-end=\"1380\">vierte Ausgabe des CSK<\/strong> widmet sich den dr\u00e4ngendsten Fragen der Cybersicherheit. Die Sessions behandeln <strong data-start=\"1461\" data-end=\"1541\">aktuelle Bedrohungen, Sicherheits-Strategien und regulatorische Anforderungen<\/strong> f\u00fcr Unternehmen und Beh\u00f6rden.\u00a0<\/p>\n<p data-start=\"173\" data-end=\"379\" style=\"text-align: justify;\">\n<ul style=\"text-align: justify;\">\n<li style=\"text-align: left;\"><strong>Umsetzung der NIS-2-Richtlinie<\/strong><\/li>\n<li style=\"text-align: left;\"><strong>Aktuelle Bedrohungslage 2025: Cyberangriffe, Ransomware, APTs<\/strong><\/li>\n<li style=\"text-align: left;\"><strong>Best Practices: Risikomanagement und Incident Response<\/strong><\/li>\n<li style=\"text-align: left;\"><strong>Compliance &amp; Zertifizierungen f\u00fcr KRITIS-Betreiber<\/strong><\/li>\n<\/ul>\n<p>[\/et_pb_cta][et_pb_button button_url=&#8220;https:\/\/www.csk-summit.de&#8220; button_text=&#8220;Jetzt anmelden&#8220; button_alignment=&#8220;center&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#a7003f&#8220; button_border_width=&#8220;0px&#8220; button_border_color=&#8220;RGBA(255,255,255,0)&#8220; button_border_radius=&#8220;15px&#8220; button_letter_spacing=&#8220;0px&#8220; custom_margin=&#8220;20px||20px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_cta title=&#8220;5. Cybersecurity |KRITIS | NIS 2&#8243; button_text=&#8220;Click Here&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;|700||on|||||&#8220; header_text_color=&#8220;#00325f&#8220; header_font_size=&#8220;23px&#8220; body_font=&#8220;||||||||&#8220; body_text_color=&#8220;#00325f&#8220; background_color=&#8220;#FFFFFF&#8220; animation_style=&#8220;zoom&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><strong>12. &#8211; 13.10.2025<\/strong><\/p>\n<p data-start=\"1350\" data-end=\"1529\">Die f\u00fcnfte Auflage des CSK bietet erneut eine hochkar\u00e4tige Plattform f\u00fcr den Austausch zu <strong>Cybersicherheit<\/strong> und <strong>KRITIS<\/strong>-relevanten Themen. Im Mittelpunkt stehen die <strong data-start=\"2293\" data-end=\"2344\">technischen und organisatorischen Anforderungen<\/strong> der NIS-2-Richtlinie sowie aktuelle Herausforderungen im Schutz kritischer Systeme.\u00a0 Themen im Fokus:<\/p>\n<ul>\n<li data-start=\"1350\" data-end=\"1529\" style=\"text-align: left;\"><strong data-start=\"2458\" data-end=\"2506\">Cybersecurity Governance &amp; Incident Response<\/strong><\/li>\n<li data-start=\"1350\" data-end=\"1529\" style=\"text-align: left;\">\u00a0<strong data-start=\"2512\" data-end=\"2556\">Technische L\u00f6sungen f\u00fcr KRITIS-Betreiber<\/strong><\/li>\n<li data-start=\"1350\" data-end=\"1529\" style=\"text-align: left;\"><strong data-start=\"2562\" data-end=\"2615\">Zero Trust, Cloud-Security &amp; Identit\u00e4tsmanagement<\/strong><\/li>\n<li data-start=\"1350\" data-end=\"1529\" style=\"text-align: left;\"><strong>Erfahrungen aus aktuellen Security-Projekten<\/strong><\/li>\n<li data-start=\"1350\" data-end=\"1529\" style=\"text-align: left;\"><strong>Praxisbeispiele und L\u00f6sungen<\/strong><\/li>\n<\/ul>\n<p data-start=\"1350\" data-end=\"1529\">\n<p>[\/et_pb_cta][et_pb_button button_url=&#8220;https:\/\/www.csk-summit.de&#8220; button_text=&#8220;Jetzt anmelden&#8220; button_alignment=&#8220;center&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#a7003f&#8220; button_border_width=&#8220;0px&#8220; button_border_color=&#8220;RGBA(255,255,255,0)&#8220; button_border_radius=&#8220;15px&#8220; button_letter_spacing=&#8220;0px&#8220; custom_margin=&#8220;20px||20px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_cta title=&#8220;IT-Sicherheit Summit&#8220; button_text=&#8220;Click Here&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;|700||on|||||&#8220; header_text_color=&#8220;#00325f&#8220; header_font_size=&#8220;23px&#8220; body_text_color=&#8220;#00325f&#8220; background_color=&#8220;#FFFFFF&#8220; animation_style=&#8220;zoom&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><strong>02. &#8211; 03.07.2025<\/strong><\/p>\n<p>Beim <strong data-start=\"2941\" data-end=\"2970\">IT-Sicherheit Summit 2025<\/strong> stehen L\u00f6sungen f\u00fcr <strong data-start=\"2991\" data-end=\"3025\">moderne IT-Security-Strategien<\/strong> im Mittelpunkt. Experten aus f\u00fchrenden Unternehmen pr\u00e4sentieren <strong data-start=\"3090\" data-end=\"3180\">aktuelle Bedrohungsszenarien, bew\u00e4hrte Sicherheitsl\u00f6sungen und innovative Technologien<\/strong>.<\/p>\n<ul>\n<li data-start=\"3185\" data-end=\"3424\" style=\"text-align: left;\"><strong data-start=\"3206\" data-end=\"3259\">Keynote-Vortr\u00e4ge f\u00fchrender Cybersecurity-Experten<\/strong><\/li>\n<li data-start=\"3185\" data-end=\"3424\" style=\"text-align: left;\"><strong data-start=\"3265\" data-end=\"3314\">Live-Demos innovativer IT-Sicherheitsl\u00f6sungen<\/strong><\/li>\n<li data-start=\"3185\" data-end=\"3424\" style=\"text-align: left;\"><strong data-start=\"3320\" data-end=\"3365\">Praxisnahe Best Practices f\u00fcr Unternehmen<\/strong><\/li>\n<li data-start=\"3185\" data-end=\"3424\" style=\"text-align: left;\">\u00a0<strong data-start=\"3371\" data-end=\"3422\">Vergleich von Security-Tools &amp; Auswahlkriterien<\/strong><\/li>\n<\/ul>\n<p data-start=\"3426\" data-end=\"3540\" style=\"text-align: left;\">Ob <strong data-start=\"3429\" data-end=\"3488\">Threat Detection, Endpoint Security oder Cloud-Security<\/strong> \u2013 hier erhalten Sie die kompakte Markt\u00fcbersicht!<\/p>\n<p>[\/et_pb_cta][et_pb_button button_url=&#8220;https:\/\/www.itsicherheit-summit.de&#8220; button_text=&#8220;Jetzt anmelden&#8220; button_alignment=&#8220;center&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#a7003f&#8220; button_border_width=&#8220;0px&#8220; button_border_color=&#8220;RGBA(255,255,255,0)&#8220; button_border_radius=&#8220;15px&#8220; button_letter_spacing=&#8220;0px&#8220; custom_margin=&#8220;20px||20px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_cta title=&#8220;OT Security Summit&#8220; button_text=&#8220;Click Here&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;|700||on|||||&#8220; header_text_color=&#8220;#00325f&#8220; body_text_color=&#8220;#00325f&#8220; background_color=&#8220;#FFFFFF&#8220; animation_style=&#8220;zoom&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><strong>\u00a030.09. &#8211; 01.10.2025<\/strong><\/p>\n<p data-start=\"3720\" data-end=\"3985\">Der <strong data-start=\"3724\" data-end=\"3746\">OT Security Summit<\/strong> fokussiert sich auf den <strong data-start=\"3771\" data-end=\"3850\">Schutz industrieller Steuerungssysteme (ICS) und kritischer Betriebstechnik<\/strong> vor Cyberangriffen. F\u00fchrende Experten geben praxisnahe Einblicke in aktuelle Bedrohungsszenarien und innovative Sicherheitsl\u00f6sungen.<\/p>\n<ul>\n<li data-start=\"3720\" data-end=\"3985\" style=\"text-align: left;\"><strong data-start=\"4016\" data-end=\"4054\">Cybersecurity in der Industrie 4.0<\/strong><\/li>\n<li data-start=\"3720\" data-end=\"3985\" style=\"text-align: left;\"><strong data-start=\"4060\" data-end=\"4091\">Zero Trust f\u00fcr OT-Netzwerke<\/strong><\/li>\n<li data-start=\"3720\" data-end=\"3985\" style=\"text-align: left;\"><strong data-start=\"4097\" data-end=\"4141\">Schwachstellen in ICS und SCADA-Systemen<\/strong><\/li>\n<li data-start=\"3720\" data-end=\"3985\" style=\"text-align: left;\"><strong data-start=\"4147\" data-end=\"4195\">Regulatorische Anforderungen f\u00fcr OT-Security<\/strong><\/li>\n<\/ul>\n<p data-start=\"4199\" data-end=\"4301\">Erfahren Sie, wie Sie <strong data-start=\"4221\" data-end=\"4291\">Angriffe auf industrielle Systeme fr\u00fchzeitig erkennen und abwehren<\/strong> k\u00f6nnen!\u00a0\u00a0<\/p>\n<p>[\/et_pb_cta][et_pb_button button_url=&#8220;https:\/\/ot-security-summit.de&#8220; button_text=&#8220;Jetzt anmelden&#8220; button_alignment=&#8220;center&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#a7003f&#8220; button_border_width=&#8220;0px&#8220; button_border_color=&#8220;RGBA(255,255,255,0)&#8220; button_border_radius=&#8220;15px&#8220; button_letter_spacing=&#8220;0px&#8220; custom_margin=&#8220;20px||20px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT-Sicherheit Summits 2025 Erleben Sie die neuesten Trends, Expertenwissen und Best Practices rund um Cybersecurity und Kritische Infrastrukturen (KRITIS). Die IT-Sicherheit Summits 2025 bieten Ihnen kostenlose Webkonferenzen mit f\u00fchrenden Experten aus Wirtschaft, Forschung und Beh\u00f6rden. Nutzen Sie die Gelegenheit, um aktuelle Cybersecurity-Trends, regulatorische Anforderungen und innovative Sicherheitsl\u00f6sungen kennenzulernen.netzen. Unsere vier spezialisierten Online-Konferenzen bieten tiefgehende Einblicke [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Start - IT-Sicherheit Summit<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Start - IT-Sicherheit Summit\" \/>\n<meta property=\"og:description\" content=\"IT-Sicherheit Summits 2025 Erleben Sie die neuesten Trends, Expertenwissen und Best Practices rund um Cybersecurity und Kritische Infrastrukturen (KRITIS). Die IT-Sicherheit Summits 2025 bieten Ihnen kostenlose Webkonferenzen mit f\u00fchrenden Experten aus Wirtschaft, Forschung und Beh\u00f6rden. Nutzen Sie die Gelegenheit, um aktuelle Cybersecurity-Trends, regulatorische Anforderungen und innovative Sicherheitsl\u00f6sungen kennenzulernen.netzen. Unsere vier spezialisierten Online-Konferenzen bieten tiefgehende Einblicke [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-summits.de\/\" \/>\n<meta property=\"og:site_name\" content=\"IT-Sicherheit Summit\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T10:43:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-summits.de\/\",\"url\":\"https:\/\/security-summits.de\/\",\"name\":\"Start - IT-Sicherheit Summit\",\"isPartOf\":{\"@id\":\"https:\/\/divi.ocelot414.lcube-server.de\/#website\"},\"datePublished\":\"2024-10-11T08:55:11+00:00\",\"dateModified\":\"2025-06-13T10:43:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/security-summits.de\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-summits.de\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-summits.de\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-summits.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Start\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/divi.ocelot414.lcube-server.de\/#website\",\"url\":\"https:\/\/divi.ocelot414.lcube-server.de\/\",\"name\":\"IT-Sicherheit Summit\",\"description\":\"Trends, Expertenwissen und Best Practices im Bereich IT-Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/divi.ocelot414.lcube-server.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Start - IT-Sicherheit Summit","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Start - IT-Sicherheit Summit","og_description":"IT-Sicherheit Summits 2025 Erleben Sie die neuesten Trends, Expertenwissen und Best Practices rund um Cybersecurity und Kritische Infrastrukturen (KRITIS). Die IT-Sicherheit Summits 2025 bieten Ihnen kostenlose Webkonferenzen mit f\u00fchrenden Experten aus Wirtschaft, Forschung und Beh\u00f6rden. Nutzen Sie die Gelegenheit, um aktuelle Cybersecurity-Trends, regulatorische Anforderungen und innovative Sicherheitsl\u00f6sungen kennenzulernen.netzen. Unsere vier spezialisierten Online-Konferenzen bieten tiefgehende Einblicke [&hellip;]","og_url":"https:\/\/security-summits.de\/","og_site_name":"IT-Sicherheit Summit","article_modified_time":"2025-06-13T10:43:39+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-summits.de\/","url":"https:\/\/security-summits.de\/","name":"Start - IT-Sicherheit Summit","isPartOf":{"@id":"https:\/\/divi.ocelot414.lcube-server.de\/#website"},"datePublished":"2024-10-11T08:55:11+00:00","dateModified":"2025-06-13T10:43:39+00:00","breadcrumb":{"@id":"https:\/\/security-summits.de\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-summits.de\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-summits.de\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-summits.de\/"},{"@type":"ListItem","position":2,"name":"Start"}]},{"@type":"WebSite","@id":"https:\/\/divi.ocelot414.lcube-server.de\/#website","url":"https:\/\/divi.ocelot414.lcube-server.de\/","name":"IT-Sicherheit Summit","description":"Trends, Expertenwissen und Best Practices im Bereich IT-Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/divi.ocelot414.lcube-server.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security-summits.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13"}],"version-history":[{"count":48,"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages\/13\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}