{"id":99928,"date":"2018-12-05T10:00:55","date_gmt":"2018-12-05T09:00:55","guid":{"rendered":"https:\/\/www.businessfactors.de\/?p=99928"},"modified":"2018-12-09T08:51:38","modified_gmt":"2018-12-09T07:51:38","slug":"strategietage-it-security-2019-vol-1","status":"publish","type":"post","link":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/","title":{"rendered":"StrategieTage IT Security 2019"},"content":{"rendered":"

[vc_row unlock_row_content=“yes“ row_height_percent=“70″ override_padding=“yes“ h_padding=“0″ top_padding=“0″ bottom_padding=“0″ back_image=“100008″ back_position=“center bottom“ overlay_alpha=“50″ gutter_size=“3″ column_width_percent=“100″ shift_y=“0″ z_index=“0″ enable_top_divider=“default“ top_divider=“fan-opacity“ shape_top_h_use_pixel=““ shape_top_height=“150″ shape_top_opacity=“100″ shape_top_index=“0″ enable_bottom_divider=“default“ bottom_divider=“fan-opacity“ shape_bottom_h_use_pixel=“true“ shape_bottom_height_percent=“35″ shape_bottom_color=“color-xsdn“ shape_bottom_opacity=“100″ shape_bottom_ratio=“yes“ shape_bottom_index=“0″ shape_bottom_responsive=“yes“ row_height_pixel=“300″ shape_dividers=““][vc_column column_width_use_pixel=“yes“ position_vertical=“middle“ align_horizontal=“align_center“ style=“dark“ overlay_alpha=“50″ gutter_size=“3″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/1″ column_width_pixel=“1000″][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“2″ top_padding=“0″ bottom_padding=“2″ back_color=“color-xsdn“ overlay_alpha=“50″ gutter_size=“3″ column_width_percent=“100″ mobile_visibility=“yes“ shift_y=“0″ z_index=“0″][vc_column column_width_use_pixel=“yes“ align_horizontal=“align_center“ overlay_alpha=“50″ gutter_size=“3″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/1″ column_width_pixel=“1000″][vc_custom_heading heading_semantic=“h1″ text_size=“bigtext“]UNSERE STRATEGIETAGE<\/strong>
\nIT Security 2019[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“2″ top_padding=“0″ bottom_padding=“2″ back_color=“color-xsdn“ overlay_alpha=“50″ gutter_size=“3″ column_width_percent=“100″ desktop_visibility=“yes“ medium_visibility=“yes“ shift_y=“0″ z_index=“0″][vc_column column_width_percent=“100″ align_horizontal=“align_center“ overlay_alpha=“50″ gutter_size=“3″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/1″][vc_custom_heading heading_semantic=“h1″ text_size=“bigtext“]UNSERE STRATEGIETAGE<\/strong>
\nIT Security 2019[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“2″ top_padding=“2″ bottom_padding=“2″ back_color=“color-xsdn“ overlay_alpha=“50″ gutter_size=“3″ column_width_percent=“100″ shift_y=“0″ z_index=“0″][vc_column width=“1\/1″][vc_column_text]Cyberkriminalit\u00e4t ist ein ganz gro\u00dfes Thema in der IT-Welt. Solche\u00a0Begriffe wie Anti-Phishing, Cloud Security und Remote Access ziehen viel Aufmerksamkeit an. Leider geh\u00f6ren die Cyberangriffe zum Alltag vieler Unternehmen und Organisationen. Der verursachte Schaden wird im Jahr 2019 weltweit auf hunderte Milliarden Euro gesch\u00e4tzt. Die Risiken sind gro\u00df, vielf\u00e4ltig und un\u00fcbersichtlich. Viele Unternehmen sind sich immer noch nicht im Klaren was genau diese Bedrohung f\u00fcr sie bedeutet und welche Folgen sie haben kann. Die Medien berichten meistens nur von gro\u00dfen Datenpannen oder massiven Cyberangriffen. Dabei ist jede Organisation betroffen. Die Vernetzung moderner Unternehmen bietet den Hackern viele Umwege, etwa durch kleinere Partnerfirmen, Lieferanten oder Kunden, um den Zugang zu Ihren Daten zu verschaffen.[\/vc_column_text][vc_column_text]Welche Ma\u00dfnahmen k\u00f6nnen ergriffen werden? Die Agenda unserer StrategieTage IT Security ist gepr\u00e4gt durch diese Leitfrage. Zum Beispiel welche Schulung f\u00fcr die eigenen Mitarbeiter bez\u00fcglich essentieller Netzsicherheitsma\u00dfnahmen ganz oben auf Ihrer IT-Sicherheits-Checkliste stehen muss, oder warum ein Chief Information Security Officer (CISO) und ein Datenschutzbeauftragter unbedingt zu jedem soliden Sicherheitskonzept geh\u00f6ren. Jedes Jahr verursacht die Nichteinhaltung von Datenschutzrichtlinien einen weltweiten Verlust von Millionen von Datens\u00e4tzen.<\/p>\n

Einschl\u00e4gige Vortr\u00e4ge und Workshops u.a. zu den Themen Compliance Management, Security Automation und Cloud Workplace werden Ihnen fachspezifische Anregungen sowie L\u00f6sungsans\u00e4tze liefern.\u00a0Ausgew\u00e4hlte F\u00fchrungskr\u00e4fte deutscher und internationaler Unternehmen werden im exklusiven Kreis zu diesen Themen vortragen, sich austauschen und wechselseitig neue Impulse generieren.[\/vc_column_text][vc_column_text]Aufgrund der hohen Nachfrage und zur besseren Planung schauen Sie nach der aktuellen Auslastung unserer StrategieTage IT Security<\/a>.[\/vc_column_text][vc_column_text]Zum Programm<\/a> der StrategieTage\u00a0IT Security 2019.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“2″ top_padding=“3″ bottom_padding=“4″ back_color=“color-xsdn“ overlay_alpha=“50″ gutter_size=“3″ column_width_percent=“100″ shift_y=“0″ z_index=“0″][vc_column column_width_percent=“100″ align_horizontal=“align_center“ overlay_alpha=“50″ gutter_size=“3″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/1″][vc_custom_heading text_size=“h1″ text_weight=“400″ text_color=“accent“ separator=“yes“ sub_lead=“yes“ sub_reduced=“yes“ subheading=“Auszug einiger unserer TOP-Referenten“]Our Speakers[\/vc_custom_heading][vc_row_inner][vc_column_inner column_width_percent=“100″ align_horizontal=“align_center“ override_padding=“yes“ column_padding=“2″ gutter_size=“3″ overlay_alpha=“50″ medium_width=“4″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/3″][vc_single_image media=“99948″ media_width_percent=“70″ alignment=“center“ shape=“img-circle“ shadow=“yes“ shadow_weight=“std“ shadow_darker=“yes“ css_animation=“zoom-in“ media_link=“|||“][vc_custom_heading heading_semantic=“h3″ text_size=“h3″ sub_reduced=“yes“ css_animation=“top-t-bottom“ subheading=“Director IAM
\nEvonik Industries AG“]Detlef Guski[\/vc_custom_heading][\/vc_column_inner][vc_column_inner column_width_percent=“100″ align_horizontal=“align_center“ override_padding=“yes“ column_padding=“2″ gutter_size=“3″ overlay_alpha=“50″ medium_width=“4″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/3″][vc_single_image media=“99946″ media_width_percent=“70″ alignment=“center“ shape=“img-circle“ shadow=“yes“ shadow_weight=“std“ shadow_darker=“yes“ css_animation=“zoom-in“ animation_delay=“100″][vc_custom_heading heading_semantic=“h3″ text_size=“h3″ sub_reduced=“yes“ css_animation=“top-t-bottom“ animation_delay=“100″ subheading=“Vice President Information Security
\nPAREXEL International GmbH“]Lars Herhold[\/vc_custom_heading][\/vc_column_inner][vc_column_inner column_width_percent=“100″ align_horizontal=“align_center“ override_padding=“yes“ column_padding=“2″ gutter_size=“3″ overlay_alpha=“50″ medium_visibility=“yes“ medium_width=“3″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ width=“1\/3″][vc_single_image media=“99950″ media_width_percent=“70″ alignment=“center“ shape=“img-circle“ shadow=“yes“ shadow_weight=“std“ shadow_darker=“yes“ css_animation=“zoom-in“ animation_delay=“200″][vc_custom_heading heading_semantic=“h3″ text_size=“h3″ sub_reduced=“yes“ css_animation=“top-t-bottom“ animation_delay=“200″ subheading=“Director BC – IS
\nInfineon Technologies AG“]Dr. Werner Gutau[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“2″ top_padding=“2″ bottom_padding=“2″ overlay_alpha=“100″ gutter_size=“4″ column_width_percent=“100″ shift_y=“0″ z_index=“0″][vc_column column_width_percent=“100″ align_horizontal=“align_center“ overlay_alpha=“100″ gutter_size=“3″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ zoom_width=“0″ zoom_height=“0″ width=“1\/1″][vc_custom_heading text_size=“h4″]Reservieren Sie sich bereits heute Ihren Platz f\u00fcr die StrategieTage IT Security 2019.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“0″ top_padding=“0″ bottom_padding=“4″ overlay_alpha=“100″ gutter_size=“4″ column_width_percent=“100″ shift_y=“0″ z_index=“0″][vc_column column_width_use_pixel=“yes“ align_horizontal=“align_center“ overlay_alpha=“100″ gutter_size=“3″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ zoom_width=“0″ zoom_height=“0″ width=“1\/1″ column_width_pixel=“700″][vc_row_inner][vc_column_inner column_width_percent=“100″ align_horizontal=“align_center“ gutter_size=“3″ overlay_alpha=“50″ medium_width=“0″ mobile_width=“0″ shift_x=“0″ shift_y=“0″ shift_y_down=“0″ z_index=“0″ css_animation=“right-t-left“ width=“1\/1″][vc_button button_color=“color-271507″ size=“btn-lg“ radius=“btn-round“ hover_fx=“full-colored“ outline=“yes“ shadow=“yes“ shadow_weight=“sm“ border_width=“0″ link=“url:%2Fde%2Fconferences%2Fit-security%2F|||“ icon=“fa fa-ticket“ width=“200″]IT Security[\/vc_button][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=“0″ override_padding=“yes“ h_padding=“0″ top_padding=“3″ bottom_padding=“4″ overlay_alpha=“100″ gutter_size=“4″ column_width_percent=“100″ border_color=“color-gyho“ border_style=“solid“ shift_y=“0″ z_index=“0″ css=“.vc_custom_1520682190233{border-top-width: 1px !important;}“][vc_column column_width_percent=“100″ align_horizontal=“align_center“ overlay_alpha=“100″ gutter_size=“3″ medium_width=“0″ shift_x=“0″ shift_y=“0″ z_index=“0″ zoom_width=“0″ zoom_height=“0″ width=“1\/1″][vc_gallery el_id=“gallery-85457″ type=“carousel“ random=“yes“ medias=“86744,91588,91586,86746,99828,99840,99834,91584,99832,94247″ carousel_lg=“7″ carousel_md=“5″ carousel_sm=“3″ gutter_size=“3″ media_items=“media|nolink|original,icon“ carousel_interval=“3000″ carousel_navspeed=“400″ carousel_loop=“yes“ stage_padding=“0″ single_overlay_opacity=“50″ single_text_anim=“no“ single_overlay_anim=“no“ single_image_anim=“no“ single_padding=“2″ single_border=“yes“ single_css_animation=“alpha-anim“ title=“REF Logos“][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"

Cyberkriminalit\u00e4t ist ein ganz gro\u00dfes Thema in der IT-Welt. Solche\u00a0Begriffe wie Anti-Phishing, Cloud Security und Remote Access ziehen viel Aufmerksamkeit an. Leider geh\u00f6ren die Cyberangriffe zum Alltag vieler Unternehmen und Organisationen. Der verursachte Schaden wird im Jahr 2019 weltweit auf hunderte Milliarden Euro gesch\u00e4tzt. Die Risiken sind gro\u00df, vielf\u00e4ltig und un\u00fcbersichtlich.<\/p>\n","protected":false},"author":18,"featured_media":100008,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[293],"tags":[1143,1146,1799,1912],"yoast_head":"\nStrategieTage IT Security 2019 - business factors Deutschland GmbH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"StrategieTage IT Security 2019\" \/>\n<meta property=\"og:description\" content=\"Cyberkriminalit\u00e4t ist ein ganz gro\u00dfes Thema in der IT-Welt. Solche\u00a0Begriffe wie Anti-Phishing, Cloud Security und Remote Access ziehen viel Aufmerksamkeit an. Leider geh\u00f6ren die Cyberangriffe zum Alltag vieler Unternehmen und Organisationen. Der verursachte Schaden wird im Jahr 2019 weltweit auf hunderte Milliarden Euro gesch\u00e4tzt. Die Risiken sind gro\u00df, vielf\u00e4ltig und un\u00fcbersichtlich.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\" \/>\n<meta property=\"og:site_name\" content=\"business factors Deutschland GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/businessfactors\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-05T09:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-09T07:51:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1008\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eduard Borger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BFactors\" \/>\n<meta name=\"twitter:site\" content=\"@BFactors\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eduard Borger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\"},\"author\":{\"name\":\"Eduard Borger\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/#\/schema\/person\/788b29ab251cf7066bbecba7d77ba75a\"},\"headline\":\"StrategieTage IT Security 2019\",\"datePublished\":\"2018-12-05T09:00:55+00:00\",\"dateModified\":\"2018-12-09T07:51:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\"},\"wordCount\":1345,\"publisher\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg\",\"keywords\":[\"Digitalisierung\",\"StrategieTage\",\"IT Security\",\"Sicherheit\"],\"articleSection\":[\"IT Security\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\",\"url\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\",\"name\":\"StrategieTage IT Security 2019 - business factors Deutschland GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg\",\"datePublished\":\"2018-12-05T09:00:55+00:00\",\"dateModified\":\"2018-12-09T07:51:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage\",\"url\":\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg\",\"contentUrl\":\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg\",\"width\":1920,\"height\":1008},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.businessfactors.de\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"StrategieTage IT Security 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/#website\",\"url\":\"https:\/\/www.businessfactors.de\/de\/\",\"name\":\"business factors Deutschland GmbH\",\"description\":\"Meet your business partners of tomorrow\",\"publisher\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.businessfactors.de\/de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/#organization\",\"name\":\"business factors Deutschland GmbH\",\"url\":\"https:\/\/www.businessfactors.de\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2019\/04\/BF_Logo_web.jpg\",\"contentUrl\":\"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2019\/04\/BF_Logo_web.jpg\",\"width\":600,\"height\":400,\"caption\":\"business factors Deutschland GmbH\"},\"image\":{\"@id\":\"https:\/\/www.businessfactors.de\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/businessfactors\/\",\"https:\/\/x.com\/BFactors\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/#\/schema\/person\/788b29ab251cf7066bbecba7d77ba75a\",\"name\":\"Eduard Borger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.businessfactors.de\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c75f56f59d9094c47b1a61fb7d81e06?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c75f56f59d9094c47b1a61fb7d81e06?s=96&d=mm&r=g\",\"caption\":\"Eduard Borger\"},\"sameAs\":[\"https:\/\/www.businessfactors.de\"],\"url\":\"https:\/\/www.businessfactors.de\/de\/author\/eduard-borger\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"StrategieTage IT Security 2019 - business factors Deutschland GmbH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/","og_locale":"de_DE","og_type":"article","og_title":"StrategieTage IT Security 2019","og_description":"Cyberkriminalit\u00e4t ist ein ganz gro\u00dfes Thema in der IT-Welt. Solche\u00a0Begriffe wie Anti-Phishing, Cloud Security und Remote Access ziehen viel Aufmerksamkeit an. Leider geh\u00f6ren die Cyberangriffe zum Alltag vieler Unternehmen und Organisationen. Der verursachte Schaden wird im Jahr 2019 weltweit auf hunderte Milliarden Euro gesch\u00e4tzt. Die Risiken sind gro\u00df, vielf\u00e4ltig und un\u00fcbersichtlich.","og_url":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/","og_site_name":"business factors Deutschland GmbH","article_publisher":"https:\/\/www.facebook.com\/businessfactors\/","article_published_time":"2018-12-05T09:00:55+00:00","article_modified_time":"2018-12-09T07:51:38+00:00","og_image":[{"width":1920,"height":1008,"url":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg","type":"image\/jpeg"}],"author":"Eduard Borger","twitter_card":"summary_large_image","twitter_creator":"@BFactors","twitter_site":"@BFactors","twitter_misc":{"Verfasst von":"Eduard Borger","Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#article","isPartOf":{"@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/"},"author":{"name":"Eduard Borger","@id":"https:\/\/www.businessfactors.de\/de\/#\/schema\/person\/788b29ab251cf7066bbecba7d77ba75a"},"headline":"StrategieTage IT Security 2019","datePublished":"2018-12-05T09:00:55+00:00","dateModified":"2018-12-09T07:51:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/"},"wordCount":1345,"publisher":{"@id":"https:\/\/www.businessfactors.de\/de\/#organization"},"image":{"@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg","keywords":["Digitalisierung","StrategieTage","IT Security","Sicherheit"],"articleSection":["IT Security"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/","url":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/","name":"StrategieTage IT Security 2019 - business factors Deutschland GmbH","isPartOf":{"@id":"https:\/\/www.businessfactors.de\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage"},"image":{"@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg","datePublished":"2018-12-05T09:00:55+00:00","dateModified":"2018-12-09T07:51:38+00:00","breadcrumb":{"@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#primaryimage","url":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg","contentUrl":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2018\/12\/itsec-news_sm.jpg","width":1920,"height":1008},{"@type":"BreadcrumbList","@id":"https:\/\/www.businessfactors.de\/de\/strategietage-it-security-2019-vol-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.businessfactors.de\/de\/"},{"@type":"ListItem","position":2,"name":"StrategieTage IT Security 2019"}]},{"@type":"WebSite","@id":"https:\/\/www.businessfactors.de\/de\/#website","url":"https:\/\/www.businessfactors.de\/de\/","name":"business factors Deutschland GmbH","description":"Meet your business partners of tomorrow","publisher":{"@id":"https:\/\/www.businessfactors.de\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.businessfactors.de\/de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.businessfactors.de\/de\/#organization","name":"business factors Deutschland GmbH","url":"https:\/\/www.businessfactors.de\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.businessfactors.de\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2019\/04\/BF_Logo_web.jpg","contentUrl":"https:\/\/www.businessfactors.de\/wp-content\/uploads\/2019\/04\/BF_Logo_web.jpg","width":600,"height":400,"caption":"business factors Deutschland GmbH"},"image":{"@id":"https:\/\/www.businessfactors.de\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/businessfactors\/","https:\/\/x.com\/BFactors"]},{"@type":"Person","@id":"https:\/\/www.businessfactors.de\/de\/#\/schema\/person\/788b29ab251cf7066bbecba7d77ba75a","name":"Eduard Borger","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.businessfactors.de\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c75f56f59d9094c47b1a61fb7d81e06?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c75f56f59d9094c47b1a61fb7d81e06?s=96&d=mm&r=g","caption":"Eduard Borger"},"sameAs":["https:\/\/www.businessfactors.de"],"url":"https:\/\/www.businessfactors.de\/de\/author\/eduard-borger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/posts\/99928"}],"collection":[{"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/comments?post=99928"}],"version-history":[{"count":0,"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/posts\/99928\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/media\/100008"}],"wp:attachment":[{"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/media?parent=99928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/categories?post=99928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.businessfactors.de\/de\/wp-json\/wp\/v2\/tags?post=99928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}