{"id":78237,"date":"2025-09-17T10:23:17","date_gmt":"2025-09-17T09:23:17","guid":{"rendered":"https:\/\/www.wallix.com\/?p=78237"},"modified":"2026-03-12T11:29:03","modified_gmt":"2026-03-12T10:29:03","slug":"webinar-2-it-sicherheit-summit","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/","title":{"rendered":"Webinar &#8211; 2. IT-Sicherheit Summit"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lr63enne-7ea4f83b83aaca51c41e1e88120380a3 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-78237'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-lrjautuc-cb652cf462d81a7d94a33577ad43b452 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lrjautuc-cb652cf462d81a7d94a33577ad43b452\">\n#top .flex_column_table.av-equal-height-column-flextable.av-lrjautuc-cb652cf462d81a7d94a33577ad43b452{\nmargin-bottom:0;\n}\n.flex_column.av-lrjautuc-cb652cf462d81a7d94a33577ad43b452{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-lrjautuc-cb652cf462d81a7d94a33577ad43b452{\nmargin-top:-150px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-lrjautuc-cb652cf462d81a7d94a33577ad43b452 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr639uyu-2228782d7379767a6684f5a9bdc99cca\">\n#top .av-special-heading.av-lr639uyu-2228782d7379767a6684f5a9bdc99cca{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lr639uyu-2228782d7379767a6684f5a9bdc99cca .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lr639uyu-2228782d7379767a6684f5a9bdc99cca .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lr639uyu-2228782d7379767a6684f5a9bdc99cca av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_hr  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >2. IT-Sicherheit Summit<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m8im9dfi-0c434f4cb136f1f5cca9934bd8e6790e\">\n#top .hr.hr-invisible.av-m8im9dfi-0c434f4cb136f1f5cca9934bd8e6790e{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-m8im9dfi-0c434f4cb136f1f5cca9934bd8e6790e hr-invisible  avia-builder-el-3  el_after_av_heading  el_before_av_image '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m49ujd5r-b8091b6ad738f747aac66bbab635147a\">\n.avia-image-container.av-m49ujd5r-b8091b6ad738f747aac66bbab635147a img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-m49ujd5r-b8091b6ad738f747aac66bbab635147a .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-m49ujd5r-b8091b6ad738f747aac66bbab635147a av-styling- av-img-linked avia-align-center  avia-builder-el-4  el_after_av_hr  el_before_av_textblock '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><a href=\"https:\/\/dashboard.gotowebinar.com\/video\/31373e4c-0d36-452f-9a38-530fbe58341c\/edit\/2\" class='avia_image '  target=\"_blank\"  rel=\"noopener noreferrer\" aria-label='GETCONTRAST Cover 1944x1080px_IT-Summit'><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-78238 avia-img-lazy-loading-not-78238 avia_image ' src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-1030x572.png\" alt='' title='GETCONTRAST Cover 1944x1080px_IT-Summit'  height=\"572\" width=\"1030\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-1030x572.png 1030w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-300x167.png 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-768x427.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-1536x853.png 1536w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-1500x833.png 1500w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-705x392.png 705w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-634x352.png 634w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-1268x704.png 1268w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-320x178.png 320w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-640x356.png 640w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-480x267.png 480w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-960x533.png 960w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-380x211.png 380w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit-760x422.png 760w, https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png 1944w\" sizes=\"(max-width: 1030px) 100vw, 1030px\" \/><\/a><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m7bovc4z-8ccc673d5b7de122211384b89adf0fbd\">\n#top .av_textblock_section.av-m7bovc4z-8ccc673d5b7de122211384b89adf0fbd .avia_textblock{\nfont-size:14px;\n}\n<\/style>\n<section  class='av_textblock_section av-m7bovc4z-8ccc673d5b7de122211384b89adf0fbd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div><\/div>\n<div>\n<h3 data-olk-copy-source=\"MessageBody\"><span style=\"font-size: 20px; font-weight: 600;\">Worum geht es?<\/span><\/h3>\n<div data-olk-copy-source=\"MessageBody\">\n<p>IT-Sicherheit ist heute ein gesch\u00e4ftskritischer Faktor f\u00fcr alle Unternehmensbereiche. Angriffe werden gezielter und komplexer \u2013 von Ransomware \u00fcber Zero-Day-Exploits bis hin zu hybriden Strategien, die klassische Schutzmechanismen umgehen. Gleichzeitig erschweren wachsende Infrastrukturen und Fachkr\u00e4ftemangel eine schnelle Reaktion. Der IT-Security Summit am 12.\u201313. November 2025 greift diese Herausforderungen auf: In Keynotes und Software-Pitches pr\u00e4sentieren Anbieter praxisnah L\u00f6sungen f\u00fcr Angriffserkennung, Risikomanagement, Kommunikationssicherheit, Zero Trust, Mobile Security, XDR\/MDR, SIEM und mehr \u2013 verst\u00e4ndlich, konkret und direkt vergleichbar.<\/p>\n<p>Auch WALLIX wird wieder mit zwei Fachvortr\u00e4gen vertreten sein rund um die Themen Zero Trust und Business Continuity Management. Referenten werden sein Kevin Jasse (Sales Representative) sowie Guido Kraft (Field CISO).<\/p>\n<h3>Wer sollte teilnehmen?<\/h3>\n<p>CISOs, IT-Verantwortliche, CIOs<\/p>\n<h3>Wichtige Erkenntnisse<\/h3>\n<p>&#8211; Vortrag: &#8222;Privileged Access Management im Fokus der Cyberabwehr&#8220;, Kevin Jasse<br \/>\n&#8211; Vortrag: &#8222;Der (steinige?) Weg zu Zero Trust und Zero Standing Privileges&#8220;, Guido Kraft<\/p>\n<\/div>\n<\/div>\n<div>\n<div><\/div>\n<div><\/div>\n<\/div>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-m7bm7jc6-49b00b3a4711da05095b7708cabaaba1-wrap avia-button-center  avia-builder-el-6  el_after_av_textblock  el_before_av_iconlist '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m7bm7jc6-49b00b3a4711da05095b7708cabaaba1\">\n#top #wrap_all .avia-button.av-m7bm7jc6-49b00b3a4711da05095b7708cabaaba1{\nmargin:20px 0 30px 0;\n}\n<\/style>\n<a href='https:\/\/itsicherheit-summit.de\/index.html'  class='avia-button av-m7bm7jc6-49b00b3a4711da05095b7708cabaaba1 av-link-btn avia-icon_select-no avia-size-small avia-position-center avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"das Webinar ansehen\"><span class='avia_iconbox_title' >das Webinar ansehen<\/span><\/a><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mfnqkhrx-6574e8d952987da5d327e0095961252e\">\n#top .avia-icon-list-container.av-mfnqkhrx-6574e8d952987da5d327e0095961252e .iconlist_icon{\nbackground-color:#ec6707;\n}\n<\/style>\n<div  class='avia-icon-list-container av-mfnqkhrx-6574e8d952987da5d327e0095961252e  avia-builder-el-7  el_after_av_button  avia-builder-el-last '><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-mfnqkhrx-6574e8d952987da5d327e0095961252e avia-iconlist-animate'>\n<li><div class='iconlist_icon av-mfnqh1jo-7ae35856bb9eea5926513814a530b1ac avia-font-svg_entypo-fontello avia-svg-icon avia-font-svg_entypo-fontello'><span class='av-icon-char' data-av_svg_icon='calendar' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"29\" height=\"32\" viewBox=\"0 0 29 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-1' aria-describedby='av-svg-desc-1' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-1'>Calendar<\/title>\n<desc id='av-svg-desc-1'>Calendar<\/desc>\n<path d=\"M25.6 4.8q1.344 0 2.272 0.928t0.928 2.272v19.2q0 1.28-0.928 2.24t-2.272 0.96h-22.4q-1.28 0-2.24-0.96t-0.96-2.24v-19.2q0-1.344 0.96-2.272t2.24-0.928h1.472v3.2h5.12v-3.2h9.28v3.2h5.12v-3.2h1.408zM25.6 27.2v-12.8h-22.4v12.8h22.4zM8.32 1.6v5.44h-2.24v-5.44h2.24zM22.72 1.6v5.44h-2.24v-5.44h2.24z\"><\/path>\n<\/svg><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: 12. - 13.11.2025\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >12. - 13.11.2025<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-mfnrb0j6-4cf5e28e18ac66e4d7e43ac4bfcb4f78 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue862' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: 9:00 - 16:00 Uhr\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >9:00 - 16:00 Uhr<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232\">\n#top .flex_column_table.av-equal-height-column-flextable.av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232{\nmargin-bottom:0;\n}\n.flex_column.av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232{\nmargin-top:-150px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232 av_one_third  avia-builder-el-8  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-2x83orh-76191a6e284817544a711ee51720e146 av-social-sharing-box-default  avia-builder-el-9  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Teilen<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf X\" href='https:\/\/twitter.com\/share?text=Webinar%20%E2%80%93%202.%20IT-Sicherheit%20Summit&#038;url=https:\/\/www.wallix.com\/de\/?p=78237' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf X'><span class='avia_hidden_link_text'>Teilen auf X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Teilen auf LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Webinar%20%E2%80%93%202.%20IT-Sicherheit%20Summit&#038;url=https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Teilen auf LinkedIn'><span class='avia_hidden_link_text'>Teilen auf LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Per E-Mail teilen\" href='mailto:?subject=Webinar%20%E2%80%93%202.%20IT-Sicherheit%20Summit&#038;body=https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Per E-Mail teilen'><span class='avia_hidden_link_text'>Per E-Mail teilen<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2haa3x9-213fa2ae720c0cf75470b8e2ca96edd9\">\n#top .hr.hr-invisible.av-2haa3x9-213fa2ae720c0cf75470b8e2ca96edd9{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2haa3x9-213fa2ae720c0cf75470b8e2ca96edd9 hr-invisible  avia-builder-el-10  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-22m4h6l-12df502323b088870716c1f1b588a696\">\n#top .av-special-heading.av-22m4h6l-12df502323b088870716c1f1b588a696{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-22m4h6l-12df502323b088870716c1f1b588a696 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-22m4h6l-12df502323b088870716c1f1b588a696 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-22m4h6l-12df502323b088870716c1f1b588a696 av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Inhalte<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1r58d5p-72a6904cfe49f23600603409c903a37e\">\n#top .hr.hr-invisible.av-1r58d5p-72a6904cfe49f23600603409c903a37e{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1r58d5p-72a6904cfe49f23600603409c903a37e hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-lrj5lstv-5ad032c61234ce7cc8b187eb0d022478  avia-builder-el-13  el_after_av_hr  el_before_av_heading   avia-builder-el-13  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86675 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Der gef\u00e4hrlichste Teil des Angriffs begann Monate zuvor\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-30T10:24:20+01:00\" >30. M\u00e4rz 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/der-gefaehrlichste-teil-des-angriffs-begann-monate-zuvor\/' title='Link zu: Der gef\u00e4hrlichste Teil des Angriffs begann Monate zuvor'>Der gef\u00e4hrlichste Teil des Angriffs begann Monate zuvor<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-81595 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Web Session Manager \u2013 PAM-Schutz auf Webanwendungen ausweiten\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:05:37+01:00\" >9. Dezember 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/web-session-manager-pam-schutz-auf-webanwendungen-ausweiten-2\/' title='Link zu: Web Session Manager \u2013 PAM-Schutz auf Webanwendungen ausweiten'>Web Session Manager \u2013 PAM-Schutz auf Webanwendungen ausweiten<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78967 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Was ist Zero Trust?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-09T16:11:46+01:00\" >9. Oktober 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/was-ist-zero-trust\/' title='Link zu: Was ist Zero Trust?'>Was ist Zero Trust?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78707 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Identity and Access Management: Ein umfassender Leitfaden\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-01T13:24:15+01:00\" >1. Oktober 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/identity-and-access-management-ein-umfassender-leitfaden\/' title='Link zu: Identity and Access Management: Ein umfassender Leitfaden'>Identity and Access Management: Ein umfassender Leitfaden<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-78700 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Was ist Privileged Account Management (PAM)?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-01T13:14:37+01:00\" >1. Oktober 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/blogpost\/was-ist-privileged-account-management-pam\/' title='Link zu: Was ist Privileged Account Management (PAM)?'>Was ist Privileged Account Management (PAM)?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1ax89vh-98d23eabcfe87166de0dee8343d342f5\">\n#top .av-special-heading.av-1ax89vh-98d23eabcfe87166de0dee8343d342f5{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1ax89vh-98d23eabcfe87166de0dee8343d342f5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1ax89vh-98d23eabcfe87166de0dee8343d342f5 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1ax89vh-98d23eabcfe87166de0dee8343d342f5 av-special-heading-h3 blockquote modern-quote  avia-builder-el-14  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Verwandte Ressourcen<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mq0od9-afb2b807cb01092fe4f3a1d6c86cd452\">\n#top .hr.hr-invisible.av-mq0od9-afb2b807cb01092fe4f3a1d6c86cd452{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-mq0od9-afb2b807cb01092fe4f3a1d6c86cd452 hr-invisible  avia-builder-el-15  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lrj5mux9-63e8a027ccbf3a89e4d9d1d217efad19  avia-builder-el-16  el_after_av_hr  avia-builder-el-last   avia-builder-el-16  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-87156 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: OT-Sicherheitsresilienz: Vor, w\u00e4hrend und nach dem Vorfall\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-04-15T13:30:12+01:00\" >15. April 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/ot-sicherheitsresilienz-vor-waehrend-und-nach-dem-vorfall\/' title='Link zu: OT-Sicherheitsresilienz: Vor, w\u00e4hrend und nach dem Vorfall'>OT-Sicherheitsresilienz: Vor, w\u00e4hrend und nach dem Vorfall<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-75011 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-17T13:52:22+01:00\" >17. Juli 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/grundlagen-der-zugriffssicherheit-ein-leitfaden-fuer-einsteiger\/' title='Link zu: Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger'>Grundlagen der Zugriffssicherheit: Ein Leitfaden f\u00fcr Einsteiger<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-67431 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-30T11:55:34+01:00\" >30. Dezember 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/3-strategien-fuer-den-sicheren-fernzugriff\/' title='Link zu: Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff'>Fertigungsindustrie | 3 Strategien f\u00fcr den sicheren Fernzugriff<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66367 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-02T15:22:39+01:00\" >2. Dezember 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/leitfaden-fuer-cisos-zur-einhaltung-gesetzlicher-vorschriften\/' title='Link zu: Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften'>Leitfaden f\u00fcr CISOs zur Einhaltung gesetzlicher Vorschriften<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65550 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: 10 zentrale Strategien f\u00fcr MSPs\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-13T16:23:28+01:00\" >13. November 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/de\/ressourcen\/whitepaper-de\/10-zentrale-strategien-fuer-msps\/' title='Link zu: 10 zentrale Strategien f\u00fcr MSPs'>10 zentrale Strategien f\u00fcr MSPs<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":27,"featured_media":78238,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[2022],"tags":[],"class_list":["post-78237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-webinars-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webinar - 2. IT-Sicherheit Summit - WALLIX<\/title>\n<meta name=\"description\" content=\"Besuchen Sie WALLIX auf dem IT-Security Summit am 12.\u201313.11.2025: Erfahren Sie in Vortr\u00e4gen zu Zero Trust &amp; PAM, wie Unternehmen Cyberabwehr &amp; Resilienz st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar - 2. IT-Sicherheit Summit - WALLIX\" \/>\n<meta property=\"og:description\" content=\"Besuchen Sie WALLIX auf dem IT-Security Summit am 12.\u201313.11.2025: Erfahren Sie in Vortr\u00e4gen zu Zero Trust &amp; PAM, wie Unternehmen Cyberabwehr &amp; Resilienz st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-17T09:23:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T10:29:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1944\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/be812e9db17509d29332b31db3b7cc52\"},\"headline\":\"Webinar &#8211; 2. IT-Sicherheit Summit\",\"datePublished\":\"2025-09-17T09:23:17+00:00\",\"dateModified\":\"2026-03-12T10:29:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/\"},\"wordCount\":2692,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png\",\"articleSection\":[\"WEBINARS\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/\",\"name\":\"Webinar - 2. IT-Sicherheit Summit - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png\",\"datePublished\":\"2025-09-17T09:23:17+00:00\",\"dateModified\":\"2026-03-12T10:29:03+00:00\",\"description\":\"Besuchen Sie WALLIX auf dem IT-Security Summit am 12.\u201313.11.2025: Erfahren Sie in Vortr\u00e4gen zu Zero Trust & PAM, wie Unternehmen Cyberabwehr & Resilienz st\u00e4rken.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/ressourcen\\\/webinars-de\\\/webinar-2-it-sicherheit-summit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png\",\"width\":1944,\"height\":1080},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/#\\\/schema\\\/person\\\/be812e9db17509d29332b31db3b7cc52\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1876e2fa433be0a686c3e616f13d4533aa9bc650db4b3efc06870b856fff37aa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1876e2fa433be0a686c3e616f13d4533aa9bc650db4b3efc06870b856fff37aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1876e2fa433be0a686c3e616f13d4533aa9bc650db4b3efc06870b856fff37aa?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/de\\\/author\\\/tessa\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar - 2. IT-Sicherheit Summit - WALLIX","description":"Besuchen Sie WALLIX auf dem IT-Security Summit am 12.\u201313.11.2025: Erfahren Sie in Vortr\u00e4gen zu Zero Trust & PAM, wie Unternehmen Cyberabwehr & Resilienz st\u00e4rken.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/","og_locale":"de_DE","og_type":"article","og_title":"Webinar - 2. IT-Sicherheit Summit - WALLIX","og_description":"Besuchen Sie WALLIX auf dem IT-Security Summit am 12.\u201313.11.2025: Erfahren Sie in Vortr\u00e4gen zu Zero Trust & PAM, wie Unternehmen Cyberabwehr & Resilienz st\u00e4rken.","og_url":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/","og_site_name":"WALLIX","article_published_time":"2025-09-17T09:23:17+00:00","article_modified_time":"2026-03-12T10:29:03+00:00","og_image":[{"width":1944,"height":1080,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png","type":"image\/png"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Verfasst von":"WALLIX","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/be812e9db17509d29332b31db3b7cc52"},"headline":"Webinar &#8211; 2. IT-Sicherheit Summit","datePublished":"2025-09-17T09:23:17+00:00","dateModified":"2026-03-12T10:29:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/"},"wordCount":2692,"publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png","articleSection":["WEBINARS"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/","url":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/","name":"Webinar - 2. IT-Sicherheit Summit - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png","datePublished":"2025-09-17T09:23:17+00:00","dateModified":"2026-03-12T10:29:03+00:00","description":"Besuchen Sie WALLIX auf dem IT-Security Summit am 12.\u201313.11.2025: Erfahren Sie in Vortr\u00e4gen zu Zero Trust & PAM, wie Unternehmen Cyberabwehr & Resilienz st\u00e4rken.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/ressourcen\/webinars-de\/webinar-2-it-sicherheit-summit\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/09\/GETCONTRAST-Cover-1944x1080px_IT-Summit.png","width":1944,"height":1080},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/de\/#website","url":"https:\/\/www.wallix.com\/de\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/de\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/de\/#\/schema\/person\/be812e9db17509d29332b31db3b7cc52","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/1876e2fa433be0a686c3e616f13d4533aa9bc650db4b3efc06870b856fff37aa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1876e2fa433be0a686c3e616f13d4533aa9bc650db4b3efc06870b856fff37aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1876e2fa433be0a686c3e616f13d4533aa9bc650db4b3efc06870b856fff37aa?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/de\/author\/tessa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/78237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/comments?post=78237"}],"version-history":[{"count":3,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/78237\/revisions"}],"predecessor-version":[{"id":85551,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/posts\/78237\/revisions\/85551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media\/78238"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/media?parent=78237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/categories?post=78237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/de\/wp-json\/wp\/v2\/tags?post=78237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}