{"id":220,"date":"2025-02-26T12:51:46","date_gmt":"2025-02-26T12:51:46","guid":{"rendered":"https:\/\/security-summits.de\/?page_id=220"},"modified":"2026-03-12T08:10:01","modified_gmt":"2026-03-12T08:10:01","slug":"impressum","status":"publish","type":"page","link":"https:\/\/security-summits.de\/?page_id=220","title":{"rendered":"Impressum"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Header&#8220; _builder_version=&#8220;4.27.4&#8243; background_color=&#8220;#0C71C3&#8243; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_type=&#8220;circular&#8220; background_color_gradient_direction_radial=&#8220;top right&#8220; background_color_gradient_stops=&#8220;#24a9e6 0%|#002672 100%&#8220; background_color_gradient_start=&#8220;#00ffd8&#8243; background_color_gradient_end=&#8220;#0029e2&#8243; background_image=&#8220;https:\/\/security-summits.de\/wp-content\/uploads\/2024\/10\/cyber-security-17.png&#8220; min_height=&#8220;962px&#8220; custom_margin=&#8220;||342px|||&#8220; custom_padding=&#8220;10vw|19px|18px|16px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.27.4&#8243; z_index=&#8220;1&#8243; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;-101px|729px||731px||&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text admin_label=&#8220;Text&#8220; _builder_version=&#8220;4.27.4&#8243; text_font=&#8220;||||||||&#8220; text_font_size=&#8220;12px&#8220; header_font=&#8220;Overpass|900|||||||&#8220; header_font_size=&#8220;84px&#8220; transform_scale=&#8220;89%|89%&#8220; transform_translate=&#8220;-58px|13px&#8220; background_layout=&#8220;dark&#8220; width=&#8220;118.5%&#8220; height=&#8220;525px&#8220; custom_margin=&#8220;|-136px|30px|||&#8220; custom_padding=&#8220;|35px|0px|35px||true&#8220; hover_enabled=&#8220;0&#8243; header_font_size_tablet=&#8220;54px&#8220; header_font_size_phone=&#8220;32px&#8220; header_font_size_last_edited=&#8220;on|desktop&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<h1>Impressum<\/h1>\n<h2><span style=\"font-size: x-large;\">DATAKONTEXT GmbH<\/span><\/h2>\n<p><span style=\"font-size: x-large;\">Augustinusstra\u00dfe 11 A<\/span><br \/><span style=\"font-size: x-large;\">50226 Frechen<\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: x-large;\">Telefon: +49 2234 98949-0<\/span><\/p>\n<p><span style=\"font-size: x-large;\">E-Mail: <a href=\"mailto:info@datakontext.com\">info@datakontext.com<\/a><\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: x-large;\">USt-IdNr.: DE297838467<\/span><br \/><span style=\"font-size: x-large;\">Registergericht: Amtsgericht K\u00f6ln, HRB 82299<\/span><br \/><span style=\"font-size: x-large;\">Gesch\u00e4ftsf\u00fchrung:<\/span><br \/><span style=\"font-size: x-large;\">Stefan Waldeisen, Dr. Karl Ulrich<\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: x-large;\"><\/span><\/p>\n<p><span style=\"font-size: large;\">Hinweis zur Verbraucherstreitbeilegung<\/span><\/p>\n<p><span style=\"font-size: large;\">Wir sind zur Teilnahme an einem Streitbeilegungsverfahren vor einer Verbraucherschlichtungsstelle weder bereit noch verpflichtet.<\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Impressum DATAKONTEXT GmbH Augustinusstra\u00dfe 11 A50226 Frechen Telefon: +49 2234 98949-0 E-Mail: info@datakontext.com USt-IdNr.: DE297838467Registergericht: Amtsgericht K\u00f6ln, HRB 82299Gesch\u00e4ftsf\u00fchrung:Stefan Waldeisen, Dr. Karl Ulrich Hinweis zur Verbraucherstreitbeilegung Wir sind zur Teilnahme an einem Streitbeilegungsverfahren vor einer Verbraucherschlichtungsstelle weder bereit noch verpflichtet.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-220","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Impressum - IT-Sicherheit Summit<\/title>\n<meta name=\"description\" content=\"Das Impressum der Datakontext GmbH, dem Veranstalter der IT-Sicherheit Summits, Cybersecurity Summit und OT Security Summit.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Impressum - IT-Sicherheit Summit\" \/>\n<meta property=\"og:description\" content=\"Das Impressum der Datakontext GmbH, dem Veranstalter der IT-Sicherheit Summits, Cybersecurity Summit und OT Security Summit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-summits.de\/?page_id=220\" \/>\n<meta property=\"og:site_name\" content=\"IT-Sicherheit Summit\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T08:10:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-summits.de\/?page_id=220\",\"url\":\"https:\/\/security-summits.de\/?page_id=220\",\"name\":\"Impressum - IT-Sicherheit Summit\",\"isPartOf\":{\"@id\":\"https:\/\/divi.ocelot414.lcube-server.de\/#website\"},\"datePublished\":\"2025-02-26T12:51:46+00:00\",\"dateModified\":\"2026-03-12T08:10:01+00:00\",\"description\":\"Das Impressum der Datakontext GmbH, dem Veranstalter der IT-Sicherheit Summits, Cybersecurity Summit und OT Security Summit.\",\"breadcrumb\":{\"@id\":\"https:\/\/security-summits.de\/?page_id=220#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-summits.de\/?page_id=220\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-summits.de\/?page_id=220#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-summits.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Impressum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/divi.ocelot414.lcube-server.de\/#website\",\"url\":\"https:\/\/divi.ocelot414.lcube-server.de\/\",\"name\":\"IT-Sicherheit Summit\",\"description\":\"Trends, Expertenwissen und Best Practices im Bereich IT-Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/divi.ocelot414.lcube-server.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Impressum - IT-Sicherheit Summit","description":"Das Impressum der Datakontext GmbH, dem Veranstalter der IT-Sicherheit Summits, Cybersecurity Summit und OT Security Summit.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Impressum - IT-Sicherheit Summit","og_description":"Das Impressum der Datakontext GmbH, dem Veranstalter der IT-Sicherheit Summits, Cybersecurity Summit und OT Security Summit.","og_url":"https:\/\/security-summits.de\/?page_id=220","og_site_name":"IT-Sicherheit Summit","article_modified_time":"2026-03-12T08:10:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-summits.de\/?page_id=220","url":"https:\/\/security-summits.de\/?page_id=220","name":"Impressum - IT-Sicherheit Summit","isPartOf":{"@id":"https:\/\/divi.ocelot414.lcube-server.de\/#website"},"datePublished":"2025-02-26T12:51:46+00:00","dateModified":"2026-03-12T08:10:01+00:00","description":"Das Impressum der Datakontext GmbH, dem Veranstalter der IT-Sicherheit Summits, Cybersecurity Summit und OT Security Summit.","breadcrumb":{"@id":"https:\/\/security-summits.de\/?page_id=220#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-summits.de\/?page_id=220"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-summits.de\/?page_id=220#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-summits.de\/"},{"@type":"ListItem","position":2,"name":"Impressum"}]},{"@type":"WebSite","@id":"https:\/\/divi.ocelot414.lcube-server.de\/#website","url":"https:\/\/divi.ocelot414.lcube-server.de\/","name":"IT-Sicherheit Summit","description":"Trends, Expertenwissen und Best Practices im Bereich IT-Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/divi.ocelot414.lcube-server.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages\/220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security-summits.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=220"}],"version-history":[{"count":7,"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages\/220\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/security-summits.de\/index.php?rest_route=\/wp\/v2\/pages\/220\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/security-summits.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}