{"id":3467,"date":"2025-02-18T07:08:17","date_gmt":"2025-02-18T07:08:17","guid":{"rendered":"https:\/\/events.mh-service.de\/?page_id=3467"},"modified":"2025-06-09T09:59:59","modified_gmt":"2025-06-09T09:59:59","slug":"rth-gpec","status":"publish","type":"page","link":"https:\/\/events.mh-service.de\/en\/rth-gpec\/","title":{"rendered":"RTH-GPEC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3467\" class=\"elementor elementor-3467\">\n\t\t\t\t<div class=\"elementor-element elementor-element-388dbf3 e-con-full e-flex e-con e-parent\" data-id=\"388dbf3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc5ef80 elementor-widget elementor-widget-slider_revolution\" data-id=\"cc5ef80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"rth-25\" data-id=\"12\" id=\"SR7_12_1\" class=\"rs-ov-hidden\" data-version=\"6.7.40\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_12_1-29\" data-key=\"29\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_12_1-29-2\" class=\"sr7-layer\">Einsatz f\u00fcr Cyberermittler: Digitale Spuren sichern \u2013 T\u00e4ter stoppen!<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_12_1-29-7\" class=\"sr7-layer\">DIE JAGD NACH DIGITALEN SPUREN BEGINNT! <\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_12_1-29-8\" class=\"sr7-layer\">Cybercrime-Seminar:\nErmittler in der digitalen Welt<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_12_1-30\" data-key=\"30\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/events.mh-service.de\/wp-content\/uploads\/2025\/01\/mh-service-logo-white.png\" data-libid=\"3242\" data-lib=\"medialibrary\" title=\"mh-service-logo-white\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9ldmVudHMubWgtc2VydmljZS5kZS93cC1jb250ZW50L3VwbG9hZHMvMjAyNS8wMS9taC1zZXJ2aWNlLWxvZ28td2hpdGUucG5n\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_12_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_12_1\",el:[600,600,768,960,720],type:'hero',shdw:'0',gh:[600,600,495,376,232],gw:[1240,1240,1024,778,480],vpt:['-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_12_1\"].state=true;} else if(SR7.PMH[\"SR7_12_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_12_1\"].fn,19);}};SR7.PMH[\"SR7_12_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4f5bb0 e-flex e-con-boxed e-con e-parent\" data-id=\"e4f5bb0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4fc1393 e-con-full e-flex e-con e-child\" data-id=\"4fc1393\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fdeb14 elementor-widget elementor-widget-heading\" data-id=\"1fdeb14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong data-start=\"32\" data-end=\"50\">Veranstaltung:<\/strong> Seminar auf der Messe Leipzig<br data-start=\"80\" data-end=\"83\" data-is-only-node=\"\"><strong data-start=\"83\" data-end=\"93\">Datum:<\/strong> 3. April 2025<br data-start=\"118\" data-end=\"121\"><strong data-start=\"121\" data-end=\"129\">Ort:<\/strong> Vortragsraum 9 im CCL (Congress Center Leipzig), Ebene +2*<br data-start=\"187\" data-end=\"190\"><strong data-start=\"190\" data-end=\"202\">Uhrzeit:<\/strong> 09:00 \u2013 12:00 Uhr<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67e4af0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"67e4af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f72a5a8 elementor-widget elementor-widget-text-editor\" data-id=\"f72a5a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p><strong style=\"color: #f3931f;\">Einsatz f\u00fcr Cyberermittler: Digitale Spuren sichern \u2013 T\u00e4ter stoppen!<\/strong><\/p><p>Bei einer Routinepr\u00fcfung taucht eine verd\u00e4chtige Anomalie im Netzwerk auf. Pl\u00f6tzlich schl\u00e4gt das System Alarm: Unbefugte Zugriffe auf vertrauliche Daten. Der erste Verdacht wird zur Gewissheit \u2013 ein Angriff l\u00e4uft. Doch wer steckt dahinter? Und wie sind die T\u00e4ter vorgegangen? Die Zeit dr\u00e4ngt. Jetzt ist pr\u00e4zise forensische Analyse gefragt \u2013 der Rapid Threat Hunter (RTH) kommt zum Einsatz!<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5210062 elementor-widget elementor-widget-text-editor\" data-id=\"5210062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>\u00a0<\/p><p>Einstieg in die Welt der Cybercrime Ermittlungen unter Verwendung des <strong>Rapid Threat Hunters (RTH)<\/strong> \u2013\u00a0Forensische Analyse der unterschiedlichen Formen von Cyberangriffen: Datenklau, Insider-Bedrohungen & Ransomware anhand von Beispielen aus der Praxis und Verwendung etablierter Werkzeuge.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14c4212 e-flex e-con-boxed e-con e-parent\" data-id=\"14c4212\" data-element_type=\"container\" data-e-type=\"container\" id=\"who\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7c09b9 elementor-widget elementor-widget-text-editor\" data-id=\"e7c09b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong style=\"color: #f3931f;\">Ihre Mission: <\/strong>Cybercrime aufkl\u00e4ren, Angriffe analysieren, digitale Beweise sichern & zu Pr\u00e4ventionsma\u00dfnahmen nutzen\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3106660 elementor-widget elementor-widget-heading\" data-id=\"3106660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBERERMITTLUNG IN AKTION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c57cea elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1c57cea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f34f8a4 e-flex e-con-boxed e-con e-parent\" data-id=\"f34f8a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4ed9e33 e-con-full e-flex e-con e-child\" data-id=\"4ed9e33\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8e8709 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"e8e8709\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-64-64H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d534bfe elementor-widget elementor-widget-text-editor\" data-id=\"d534bfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>IDENTIFIZIEREN \u2013 Beweise sichern & T\u00e4ter \u00fcberf\u00fchren<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdd55c9 elementor-widget elementor-widget-spacer\" data-id=\"fdd55c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f64671e elementor-widget elementor-widget-text-editor\" data-id=\"f64671e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wer hat zugegriffen? Welche Daten wurden entwendet? Wann und wie geschah es? <br \/>Fragen zu Identit\u00e4ts-\u00dcbernahmen \u2013 Kompromittierung von Cloud-Diensten, Malware und Datendiebstahl.<br \/>Wir zeigen, wie digitale Ermittlungen effizient durchgef\u00fchrt werden, um schnelle Antworten zu liefern.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d0f3da e-con-full e-flex e-con e-child\" data-id=\"3d0f3da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6598fa2 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6598fa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-search\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84b1acb elementor-widget elementor-widget-text-editor\" data-id=\"84b1acb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>ANALYSIEREN \u2013 Der digitale Tatort<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ceea8f8 elementor-widget elementor-widget-spacer\" data-id=\"ceea8f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e313977 elementor-widget elementor-widget-text-editor\" data-id=\"e313977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyberangriffe verstehen: Wie k\u00f6nnen Ermittler T\u00e4terverhalten rekonstruieren, welche Spuren hinterlassen T\u00e4ter? Wie k\u00f6nnen Ermittler Sicherheitsl\u00fccken erkennen? Mit fundierten Methoden der <strong>digitalen Forensik <\/strong>werden Angriffe nachvollziehbar \u2013 und T\u00e4ter identifizierbar.<br \/>Ziel ist eine <strong>transparente und gerichtsfeste Dokumentation<\/strong>, die Beh\u00f6rden bef\u00e4higt, auf komplexe Bedrohungen schnell und wirkungsvoll zu reagieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f1498c e-con-full e-flex e-con e-child\" data-id=\"8f1498c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-255f832 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"255f832\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-291369e elementor-widget elementor-widget-text-editor\" data-id=\"291369e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>SCH\u00dcTZEN \u2013 Pr\u00e4ventionsma\u00dfnahmen ableiten & digitale Verteidigungslinie aufbauen<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14ddf8b elementor-widget elementor-widget-text-editor\" data-id=\"14ddf8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Welche forensischen Werkzeuge und Methoden sind entscheidend, um Cyberattacken zu analysieren und abzuwehren? Erfahren Sie, wie <strong>eine belastbare Sicherheitsarchitektur<\/strong> entsteht und wie Angriffsfl\u00e4chen reduziert werden \u2013 <strong>pr\u00e4ventiv und reaktiv<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1808320 e-flex e-con-boxed e-con e-parent\" data-id=\"1808320\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8245763 elementor-widget elementor-widget-text-editor\" data-id=\"8245763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Bereit f\u00fcr den Ernstfall?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7c8ab2 elementor-widget elementor-widget-text-editor\" data-id=\"b7c8ab2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyberkriminelle entwickeln ihre Methoden st\u00e4ndig weiter \u2013 die Ermittlungsbeh\u00f6rden m\u00fcssen mithalten. Mit modernster <strong>Threat Hunting-Technologie und forensischer Analyse<\/strong> r\u00fcsten wir Sie f\u00fcr den digitalen Ernstfall.<br><br>*Bitte beachten Sie, dass die Raumangabe vorbehaltlich ist. Pr\u00fcfen Sie den Raumplan der Messe.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-157c6e7 e-flex e-con-boxed e-con e-parent\" data-id=\"157c6e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76bcc71 elementor-widget elementor-widget-text-editor\" data-id=\"76bcc71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\ud83d\ude94 <strong>Jetzt anmelden und Cybercrime einen Schritt voraus sein!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e0bf43 elementor-widget elementor-widget-text-editor\" data-id=\"6e0bf43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong style=\"color:#f3931f\";>Registration is now closed<\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4e40c2 e-flex e-con-boxed e-con e-parent\" data-id=\"e4e40c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-276e403 elementor-widget elementor-widget-spacer\" data-id=\"276e403\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Veranstaltung: Seminar auf der Messe LeipzigDatum: 3. April 2025Ort: Vortragsraum 9 im CCL (Congress Center Leipzig), Ebene +2*Uhrzeit: 09:00 \u2013 12:00 Uhr Einsatz f\u00fcr [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-custom.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3467","page","type-page","status-publish","hentry"],"acf":{"full_width":true,"header_transparent":false,"header_white":false},"_links":{"self":[{"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/pages\/3467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/comments?post=3467"}],"version-history":[{"count":42,"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/pages\/3467\/revisions"}],"predecessor-version":[{"id":3882,"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/pages\/3467\/revisions\/3882"}],"wp:attachment":[{"href":"https:\/\/events.mh-service.de\/en\/wp-json\/wp\/v2\/media?parent=3467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}