{"id":65599,"date":"2024-11-15T10:22:57","date_gmt":"2024-11-15T09:22:57","guid":{"rendered":"https:\/\/www.wallix.com\/?p=65599"},"modified":"2025-04-09T10:09:10","modified_gmt":"2025-04-09T09:09:10","slug":"privileged-access-management-im-fokus-der-cyberabwehr","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/","title":{"rendered":"Privileged Access Management im Fokus der Cyberabwehr"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-4v2wapo-d78b990d043c96f2a57ed55ca21494bc avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 56.25%;'><li  class='avia-slideshow-slide av-4v2wapo-d78b990d043c96f2a57ed55ca21494bc__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-20414 avia-img-lazy-loading-not-20414\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/03\/AS_Marseille-1.jpg\" width=\"752\" height=\"423\" title='AS_Marseille' alt='WALLIX announces Expansion Plan in North America'  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/03\/AS_Marseille-1.jpg 1280w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/03\/AS_Marseille-1-300x169.jpg 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/03\/AS_Marseille-1-1024x576.jpg 1024w, https:\/\/www.wallix.com\/wp-content\/uploads\/2022\/03\/AS_Marseille-1-768x432.jpg 768w\" sizes=\"(max-width: 752px) 100vw, 752px\" \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-65599'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-3zrhvlo-dcb4206572af8c9b8ff0bf57c3032e2d sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3zrhvlo-dcb4206572af8c9b8ff0bf57c3032e2d\">\n#top .flex_column_table.av-equal-height-column-flextable.av-3zrhvlo-dcb4206572af8c9b8ff0bf57c3032e2d{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-3zrhvlo-dcb4206572af8c9b8ff0bf57c3032e2d{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-3zrhvlo-dcb4206572af8c9b8ff0bf57c3032e2d{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-3zrhvlo-dcb4206572af8c9b8ff0bf57c3032e2d av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lsbshh96-df82b1715349ead3164b524f01c82c74\">\n#top .av-special-heading.av-lsbshh96-df82b1715349ead3164b524f01c82c74{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lsbshh96-df82b1715349ead3164b524f01c82c74 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lsbshh96-df82b1715349ead3164b524f01c82c74 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lsbshh96-df82b1715349ead3164b524f01c82c74 av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Der heilige Datenschutzgral<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lsbsjbqv-ea399032274b910c0d351f93b4d7d20d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Laut einem Bericht des Beratungshauses Forrester basieren etwa 80% der in den Medien vorkommenden Cyber-Angriffe heutzutage in gewisser Weise auf dem Diebstahl privilegierter Anmeldeinformationen. Dies liegt daran, dass f\u00fcr Cyberkriminelle der Zugang \u00fcber privilegierte Konten der einfachste und schnellste Weg in ein IT-System ist, um sensible Daten zu stehlen.<\/p>\n<p>Privilegierte Nutzer haben in der Regel umfassende Administrator- und Root-Rechte, die f\u00fcr Aufgaben wie System-Updates und Wartung notwendig sind. Allerdings erm\u00f6glichen diese Privilegien auch, bestehende Sicherheitsprotokolle zu umgehen. Das ist die Schwachstelle, die b\u00f6sartige Akteure ausnutzen, um unerlaubte System\u00e4nderungen vorzunehmen, auf gesperrte Daten zuzugreifen und\/oder ihre Handlungen zu verschleiern. Traditionelle Sicherheitsl\u00f6sungen bieten in dieser Hinsicht keinen Schutz.<\/p>\n<p>Erfahren Sie in unserem Webinar&#8230;<\/p>\n<p>warum Access Management f\u00fcr die Sicherheit so entscheidend ist,<br \/>\nwelche Funktionen in den Technologien des \u201eAccess Management\u201c enthalten sind,<br \/>\nwelche Rolle die Zugriffskontrolle in Compliance-Standards spielt,<br \/>\nwie ein PAM-System in der Regel strukturiert ist, und<br \/>\nwie praktische Beispiele (Use Cases) aussehen.<\/p>\n<p>Durch das Webinar f\u00fchrt Sie unser Experte Maruf Magsudi, Partner Sales Representative.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/dashboard.gotowebinar.com\/video\/27dcee77-72ad-4fc5-b146-4a218fa84256\/edit\/2\"><strong>Hier geht es zur Webinar-Aufzeichnung:<\/strong><\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/attendee.gotowebinar.com\/register\/8934829836496649309\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-65600 size-large\" src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-1030x559.png\" alt=\"\" width=\"1030\" height=\"559\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-1030x559.png 1030w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-300x163.png 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-768x417.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-1536x833.png 1536w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-1500x814.png 1500w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2-705x382.png 705w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/Capture-2.png 1917w\" sizes=\"auto, (max-width: 1030px) 100vw, 1030px\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><\/h3>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3e4g6jg-b68300c6e381f78fed506ab989d3fe0f\">\n#top .flex_column_table.av-equal-height-column-flextable.av-3e4g6jg-b68300c6e381f78fed506ab989d3fe0f{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-3e4g6jg-b68300c6e381f78fed506ab989d3fe0f{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-3e4g6jg-b68300c6e381f78fed506ab989d3fe0f{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-3e4g6jg-b68300c6e381f78fed506ab989d3fe0f av_one_third  avia-builder-el-4  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-2zcf8d8-4e98fcdb96dfc7c5783162a6f9059356 av-social-sharing-box-default  avia-builder-el-5  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Comparta este seminario web<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Privileged%20Access%20Management%20im%20Fokus%20der%20Cyberabwehr&#038;url=https:\/\/www.wallix.com\/de\/?p=65599' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Privileged%20Access%20Management%20im%20Fokus%20der%20Cyberabwehr&#038;url=https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Privileged%20Access%20Management%20im%20Fokus%20der%20Cyberabwehr&#038;body=https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2jzqji4-2e88faeb9135bccaca0036f4d4c8d974\">\n#top .hr.hr-invisible.av-2jzqji4-2e88faeb9135bccaca0036f4d4c8d974{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2jzqji4-2e88faeb9135bccaca0036f4d4c8d974 hr-invisible  avia-builder-el-6  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-25vxxng-ef4eefca19381aa1b63833d81a6cb847\">\n#top .av-special-heading.av-25vxxng-ef4eefca19381aa1b63833d81a6cb847{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-25vxxng-ef4eefca19381aa1b63833d81a6cb847 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-25vxxng-ef4eefca19381aa1b63833d81a6cb847 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-25vxxng-ef4eefca19381aa1b63833d81a6cb847 av-special-heading-h3 blockquote modern-quote  avia-builder-el-7  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Inhalte<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-58vpa4-94d64b3f97f91986f8d962c71734089d\">\n#top .hr.hr-invisible.av-58vpa4-94d64b3f97f91986f8d962c71734089d{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-58vpa4-94d64b3f97f91986f8d962c71734089d hr-invisible  avia-builder-el-8  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-lsbsiuky-ad7a8a44fe01009bf3b88e440ead2682  avia-builder-el-9  el_after_av_hr  el_before_av_heading   avia-builder-el-9  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-65648 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: PAM im Gesundheitswesen: Der Schl\u00fcssel zur Cybersicherheit\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-15T12:10:45+01:00\" >November 15, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr-2\/' title='Link zu: PAM im Gesundheitswesen: Der Schl\u00fcssel zur Cybersicherheit'>PAM im Gesundheitswesen: Der Schl\u00fcssel zur Cybersicherheit<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65599 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Privileged Access Management im Fokus der Cyberabwehr\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-15T10:22:57+01:00\" >November 15, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/' title='Link zu: Privileged Access Management im Fokus der Cyberabwehr'>Privileged Access Management im Fokus der Cyberabwehr<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-10ebscc-2c8be9e4b3807661244d50da1b41103f\">\n#top .av-special-heading.av-10ebscc-2c8be9e4b3807661244d50da1b41103f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-10ebscc-2c8be9e4b3807661244d50da1b41103f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-10ebscc-2c8be9e4b3807661244d50da1b41103f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-10ebscc-2c8be9e4b3807661244d50da1b41103f av-special-heading-h3 blockquote modern-quote  avia-builder-el-10  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressource<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-vs9zq4-645cf15d57ce9711c24500cb14b02712\">\n#top .hr.hr-invisible.av-vs9zq4-645cf15d57ce9711c24500cb14b02712{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-vs9zq4-645cf15d57ce9711c24500cb14b02712 hr-invisible  avia-builder-el-11  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lsbsio3f-eb697f3dbf136bad790f201d645b9903  avia-builder-el-12  el_after_av_hr  avia-builder-el-last   avia-builder-el-12  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-56999 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: NIS\/NIS2-Richtlinien\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-04-17T15:03:07+01:00\" >April 17, 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ot-de\/ot-whitepaper-de\/nis-nis2-richtlinien\/' title='Link zu: NIS\/NIS2-Richtlinien'>NIS\/NIS2-Richtlinien<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":39,"featured_media":65295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[2009,2110,2022],"tags":[],"class_list":["post-65599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance-webinars-de","category-privileged-access-management-de-2","category-webinars-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privileged Access Management im Fokus der Cyberabwehr - WALLIX<\/title>\n<meta name=\"description\" content=\"In unserem Webinar sprechen wir dar\u00fcber, welche Anpassungen bei der DSGVO erforderlich sind, um einen hohen Datenschutz zu gew\u00e4hrleisten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privileged Access Management im Fokus der Cyberabwehr - WALLIX\" \/>\n<meta property=\"og:description\" content=\"In unserem Webinar sprechen wir dar\u00fcber, welche Anpassungen bei der DSGVO erforderlich sind, um einen hohen Datenschutz zu gew\u00e4hrleisten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-15T09:22:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-09T09:09:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-1030x577.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Clarisse Cottin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Clarisse Cottin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\"},\"author\":{\"name\":\"Clarisse Cottin\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/fe7232db18f9b53a3b950a7abadc4efe\"},\"headline\":\"Privileged Access Management im Fokus der Cyberabwehr\",\"datePublished\":\"2024-11-15T09:22:57+00:00\",\"dateModified\":\"2025-04-09T09:09:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\"},\"wordCount\":1825,\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg\",\"articleSection\":[\"COMPLIANCE\",\"PRIVILEGED ACCESS MANAGEMENT\",\"WEBINARS\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\",\"url\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\",\"name\":\"Privileged Access Management im Fokus der Cyberabwehr - WALLIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg\",\"datePublished\":\"2024-11-15T09:22:57+00:00\",\"dateModified\":\"2025-04-09T09:09:10+00:00\",\"description\":\"In unserem Webinar sprechen wir dar\u00fcber, welche Anpassungen bei der DSGVO erforderlich sind, um einen hohen Datenschutz zu gew\u00e4hrleisten.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg\",\"width\":2560,\"height\":1435,\"caption\":\"Digital security shield icon on a circuit board background. Printed circuit board. Technology background. 3D illustration. PCB, Code, HTML. AI generated illustration.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wallix.com\/de\/#website\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wallix.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wallix.com\/de\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\/\/www.wallix.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/wallixcom\",\"https:\/\/www.linkedin.com\/company\/wallix\/\",\"https:\/\/www.youtube.com\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/fe7232db18f9b53a3b950a7abadc4efe\",\"name\":\"Clarisse Cottin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/787a136bda989f9be62dfb41b286ba010ad24c91ac6018a0a1ef694531f0567b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/787a136bda989f9be62dfb41b286ba010ad24c91ac6018a0a1ef694531f0567b?s=96&d=mm&r=g\",\"caption\":\"Clarisse Cottin\"},\"url\":\"https:\/\/www.wallix.com\/de\/author\/clarisse\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privileged Access Management im Fokus der Cyberabwehr - WALLIX","description":"In unserem Webinar sprechen wir dar\u00fcber, welche Anpassungen bei der DSGVO erforderlich sind, um einen hohen Datenschutz zu gew\u00e4hrleisten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/","og_locale":"de_DE","og_type":"article","og_title":"Privileged Access Management im Fokus der Cyberabwehr - WALLIX","og_description":"In unserem Webinar sprechen wir dar\u00fcber, welche Anpassungen bei der DSGVO erforderlich sind, um einen hohen Datenschutz zu gew\u00e4hrleisten.","og_url":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/","og_site_name":"WALLIX","article_published_time":"2024-11-15T09:22:57+00:00","article_modified_time":"2025-04-09T09:09:10+00:00","og_image":[{"width":1030,"height":577,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-1030x577.jpeg","type":"image\/jpeg"}],"author":"Clarisse Cottin","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"Clarisse Cottin","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/"},"author":{"name":"Clarisse Cottin","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/fe7232db18f9b53a3b950a7abadc4efe"},"headline":"Privileged Access Management im Fokus der Cyberabwehr","datePublished":"2024-11-15T09:22:57+00:00","dateModified":"2025-04-09T09:09:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/"},"wordCount":1825,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg","articleSection":["COMPLIANCE","PRIVILEGED ACCESS MANAGEMENT","WEBINARS"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/","url":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/","name":"Privileged Access Management im Fokus der Cyberabwehr - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg","datePublished":"2024-11-15T09:22:57+00:00","dateModified":"2025-04-09T09:09:10+00:00","description":"In unserem Webinar sprechen wir dar\u00fcber, welche Anpassungen bei der DSGVO erforderlich sind, um einen hohen Datenschutz zu gew\u00e4hrleisten.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/privileged-access-management-im-fokus-der-cyberabwehr\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/11\/AdobeStock_875119401-scaled.jpeg","width":2560,"height":1435,"caption":"Digital security shield icon on a circuit board background. Printed circuit board. Technology background. 3D illustration. PCB, Code, HTML. AI generated illustration."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/fe7232db18f9b53a3b950a7abadc4efe","name":"Clarisse Cottin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/787a136bda989f9be62dfb41b286ba010ad24c91ac6018a0a1ef694531f0567b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/787a136bda989f9be62dfb41b286ba010ad24c91ac6018a0a1ef694531f0567b?s=96&d=mm&r=g","caption":"Clarisse Cottin"},"url":"https:\/\/www.wallix.com\/de\/author\/clarisse\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/65599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=65599"}],"version-history":[{"count":7,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/65599\/revisions"}],"predecessor-version":[{"id":71213,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/65599\/revisions\/71213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/65295"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=65599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=65599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=65599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}