{"id":145929,"date":"2024-09-18T10:54:42","date_gmt":"2024-09-18T08:54:42","guid":{"rendered":"http:\/\/e3mag.com\/?post_type=tribe_events&#038;p=145929"},"modified":"2024-09-18T10:54:42","modified_gmt":"2024-09-18T08:54:42","slug":"strategy-summit-cyber-security-2024","status":"publish","type":"tribe_events","link":"https:\/\/e3mag.com\/en\/event\/strategiegipfel-cyber-security-2024\/","title":{"rendered":"Cyber Security Strategy Summit"},"content":{"rendered":"<p>Cyber crime-as-a-service, the targeted use of AI and the merging of organized crime with \"state interests\" can drive entire companies to the brink of extinction and make the challenge of protecting the company a very important but also expensive matter. If we wanted to exhaust all protection options, it would actually be impossible to finance. There is too much external support on offer.<\/p>\n<p>The question must therefore be asked as to which use of funds brings the greatest success - and which brings only very limited benefits. At the same time, many EU regulations leave little room for maneuver in the decision-making process. It is therefore becoming increasingly important to discuss what makes sense and is also accepted by the authorities.<\/p>\n<p>How do you protect yourself from the increasing number and quality of attacks?<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber Crime-as-a-service, der gezielte Einsatz von AI und das Verschmelzen von organisierter Kriminalit\u00e4t mit \u201estaatlicher Interessen\u201c k\u00f6nnen ganze Unternehmen an den Rand der Existenzgrundlage treiben und macht die Herausforderung das Unternehmen zu sch\u00fctzen zu einer sehr wichtigen aber auch teuren Angelegenheit. Wollten wir alle Schutzm\u00f6glichkeiten aussch\u00f6pfen w\u00e4re das tats\u00e4chlich nicht zu finanzieren. Zu gro\u00df ist [&hellip;]<\/p>\n","protected":false},"author":2368,"featured_media":145930,"template":"","meta":{"_acf_changed":false,"pmpro_default_level":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[42124],"coauthors":[39720],"class_list":["post-145929","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tribe_events_cat-event","pmpro-has-access","cat_event"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2.jpg",1920,1080,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-400x225.jpg",400,225,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-768x432.jpg",768,432,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x675.jpg",1200,675,true],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-100x56.jpg",100,56,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-480x270.jpg",480,270,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-640x360.jpg",640,360,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-720x405.jpg",720,405,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-960x540.jpg",960,540,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1168x657.jpg",1168,657,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1440x810.jpg",1440,810,true],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2.jpg",1920,1080,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1536x864.jpg",1536,864,true],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2.jpg",1920,1080,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-18x10.jpg",18,10,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x675.jpg",1200,675,true],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x675.jpg",1200,675,true],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x1080.jpg",1200,1080,true],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-600x338.jpg",600,338,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-600x600.jpg",600,600,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Cyber Crime-as-a-service, der gezielte Einsatz von AI und das Verschmelzen von organisierter Kriminalit\u00e4t mit \u201estaatlicher Interessen\u201c k\u00f6nnen ganze Unternehmen an den Rand der Existenzgrundlage treiben und macht die Herausforderung das Unternehmen zu sch\u00fctzen zu einer sehr wichtigen aber auch teuren Angelegenheit. Wollten wir alle Schutzm\u00f6glichkeiten aussch\u00f6pfen w\u00e4re das tats\u00e4chlich nicht zu finanzieren. Zu gro\u00df ist das Angebot an externer Unterst\u00fctzung. Die Frage, welcher Mitteleinsatz die gr\u00f6\u00dften Erfolge bringt \u2013 und was nur sehr begrenzten Nutzen bringt, muss also gestellt werden. Gleichzeitig lassen viele EU-Vorgaben wenig Spielraum bei der eigenen Entscheidungsfindung. Daher wird es immer wichtiger, sich dar\u00fcber auszutauschen, was sinnvoll&hellip;<\/p>\n","category_list_v2":"","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tribe_events\/145929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2368"}],"version-history":[{"count":3,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tribe_events\/145929\/revisions"}],"predecessor-version":[{"id":145933,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tribe_events\/145929\/revisions\/145933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/145930"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=145929"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=145929"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=145929"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=145929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}