{"id":29593,"date":"2020-06-10T08:46:27","date_gmt":"2020-06-10T06:46:27","guid":{"rendered":"https:\/\/www.weyer-gruppe.com\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/"},"modified":"2021-06-21T07:54:37","modified_gmt":"2021-06-21T05:54:37","slug":"martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020","status":"publish","type":"post","link":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/","title":{"rendered":"Martin Wundram in the role of a hacker &#8211; How do you break through an IT security system? Colloquium 2020"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_column_text]\n<p>\n<em>Am 18. Juni 2020 findet zum 17. Mal das Kolloquium der weyer gruppe statt. Veranstaltungsort ist jedoch diesmal nicht der denkmalgesch\u00fctzte Schillingspark in D\u00fcren-G\u00fcrzenich, zwischen Aachen und K\u00f6ln, sondern das Internet. Aufgrund der Corona-Pandemie hat die weyer gruppe umgeplant und veranstaltet zum ersten Mal in der Firmengeschichte einen interaktiven Live-Stream. Weitere Informationen zum Ablauf der Veranstaltung finden Sie <u><a href=\"https:\/\/www.weyer-gruppe.com\/anmeldung-kolloquium\/\" target=\"_blank\" rel=\"noreferrer noopener\">hier<\/a><\/u>. Das Fokusthema k\u00f6nnte aktueller nicht sein: Der Branchenaustausch dreht sich diesmal rund um die Cyber Security f\u00fcr Maschinen und Anlagen. Insgesamt sieben Referenten werden ihre Expertise und Erfahrungen zum Thema darlegen. Um Sie auf den Thementag einzustimmen, werden wir in den n\u00e4chsten Wochen unseren Moderator und die sieben Redner vorstellen.\u00a0 <\/em>&#13;\n<p><\/p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]\n<p>We now understand that hacker attacks are an increasing threat in the ongoing digitalisation and a challenge of Industry 4.0. Plant operators and manufacturers should not take the topic of cyber security lightly. But how can you check and test your IT security concept? Which methods do hackers use in their attacks?  <\/p>\n<p>Martin Wundram is the founder and managing director of TronicGuard GmbH and <a href=\"https:\/\/www.digitrace.de\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\">DigiTrace GmbH<\/a>. He has already been working as an expert in the IT sector for 15 years. As a publicly appointed and sworn expert for information processing systems with a focus on IT security and IT forensics, Martin Wundram has well-known business partners. These include courts, public prosecutors&#8217; offices, police authorities, companies and private individuals.  He also regularly gives lectures, organises training courses and writes as a freelance author, e.g. for the IT magazines &#8220;iX&#8221; and &#8220;c&#8217;t&#8221;.<\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"grve-element grve-image grve-align-center\" style=\"\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/foto-martin-wundram.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/foto-martin-wundram.jpg 300w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/foto-martin-wundram-150x150.jpg 150w, https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/foto-martin-wundram-80x80.jpg 80w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]\n<p>In the field of IT security, Martin Wundram has two main areas of consulting: on the one hand, the creation and review of security concepts and, on the other hand, so-called penetration tests. Penetration tests are planned hacker attacks that serve to test systems. How exactly does a penetration test work, you ask?  <\/p>\n<p>Mr Wundram will demonstrate and explain this to you live during our digital colloquium 2020. This way, you can experience exactly how hackers proceed in the event of an attack, understand how they develop an initial motivation, and then step by step, with each success, penetrate further into the complex IT infrastructure.  The fictitious quarry company &#8220;Stein zu Sand AG&#8221;, which works exclusively with the help of machines and high-end industrial robots, is attacked. It is therefore a good example of a company in the context of Industry 4.0. Afterwards, you will learn what countermeasures are available to prevent such an attack.  <\/p>\n<p>Despite the difficulties caused by the Corona pandemic, we are already very much looking forward to welcoming you to our interactive digital colloquium on 18 June 2020.<\/p>\n<p>Learn more about the colloquium on 18 June 2020 <a href=\"https:\/\/www.weyer-gruppe.com\/anmeldung-kolloquium\/\"><u>here<\/u><\/a>.<\/p>\n<p>Register <a href=\"https:\/\/www.weyer-gruppe.com\/anmeldung-kolloquium\/#formular\"><u>here<\/u><\/a> <strong>free<\/strong> of charge for the Colloquium 2020.<\/p>\n<p>Do you have any questions? Then please feel free to contact us:<\/p>\n<p><strong>Juri Raffetseder<\/strong><br \/>horst weyer und partner gmbh<br \/>Tel.: +49 2421 \u2013 69 09 11 29<br \/>E-Mail: <a href=\"mailto:j.raffetseder@weyer-gruppe.com\">j.raffetseder@weyer-gruppe.com<\/a><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Am 18. Juni 2020 findet zum 17. Mal das Kolloquium der weyer gruppe statt. Veranstaltungsort ist jedoch diesmal nicht der denkmalgesch\u00fctzte Schillingspark in D\u00fcren-G\u00fcrzenich, zwischen Aachen und K\u00f6ln, sondern das Internet. Aufgrund der Corona-Pandemie hat die weyer gruppe umgeplant und veranstaltet zum ersten Mal in der Firmengeschichte einen interaktiven Live-Stream. Weitere Informationen zum Ablauf [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5959,6023,5958],"tags":[6049,6048,6050,6054,6051,6053,6047,6052],"class_list":["post-29593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-colloquium-2020","category-cyber-security-in-plant-security","category-cyber-security-of-plants","tag-corona-en","tag-cyber-security-en","tag-kolloquium-en","tag-kolloquiumgoesdigital-en","tag-online-event-en","tag-online-kolloquium-en","tag-plant-safety","tag-security-engineering-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How do you breach a company&#039;s IT security system?<\/title>\n<meta name=\"description\" content=\"At the weyer gruppe&#039;s Colloquium 2020 on 18 June, Mr Martin Wundram will speak about corporate IT security systems in the role of a hacker.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Martin Wundram in the role of a hacker - How do you break through an IT security system? Colloquium 2020\" \/>\n<meta property=\"og:description\" content=\"At the weyer gruppe&#039;s Colloquium 2020 on 18 June, Mr Martin Wundram will speak about corporate IT security systems in the role of a hacker.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"weyer gruppe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weyergruppe\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-10T06:46:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-21T05:54:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"878\" \/>\n\t<meta property=\"og:image:height\" content=\"494\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juri Lasse Raffetseder\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juri Lasse Raffetseder\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/\"},\"author\":{\"name\":\"Juri Lasse Raffetseder\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#\\\/schema\\\/person\\\/565b67e11d499b553c41b08563de2655\"},\"headline\":\"Martin Wundram in the role of a hacker &#8211; How do you break through an IT security system? Colloquium 2020\",\"datePublished\":\"2020-06-10T06:46:27+00:00\",\"dateModified\":\"2021-06-21T05:54:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/\"},\"wordCount\":543,\"publisher\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg\",\"keywords\":[\"corona\",\"Cyber Security\",\"Kolloquium\",\"kolloquiumgoesdigital\",\"Online-Event\",\"Online-Kolloquium\",\"Plant safety\",\"Security Engineering\"],\"articleSection\":[\"Colloquium 2020\",\"Cyber security in plant security\",\"Cyber security of plants\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/\",\"name\":\"How do you breach a company's IT security system?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg\",\"datePublished\":\"2020-06-10T06:46:27+00:00\",\"dateModified\":\"2021-06-21T05:54:37+00:00\",\"description\":\"At the weyer gruppe's Colloquium 2020 on 18 June, Mr Martin Wundram will speak about corporate IT security systems in the role of a hacker.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg\",\"contentUrl\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg\",\"width\":878,\"height\":494},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/2020\\\/06\\\/10\\\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"HOME\",\"item\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Colloquium 2020\",\"item\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/category\\\/colloquium-2020\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Martin Wundram in the role of a hacker &#8211; How do you break through an IT security system? Colloquium 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/\",\"name\":\"weyer gruppe\",\"description\":\"komplett. durchdacht.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#organization\",\"name\":\"weyer gruppe\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/logo-weyer-gruppe-de.png\",\"contentUrl\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/logo-weyer-gruppe-de.png\",\"width\":532,\"height\":513,\"caption\":\"weyer gruppe\"},\"image\":{\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/weyergruppe\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/weyer-gruppe\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCmZItECuW56Ih_p501_Bq8A\"],\"description\":\"Die weyer gruppe ist seit 1976 Ihr Partner f\u00fcr verfahrenstechnische Anlagenplanung und Anlagensicherheit. Mit einem erfahrenen Team von \u00fcber 190 Mitarbeitern in Deutschland, \u00d6sterreich, Polen und der Schweiz realisieren wir j\u00e4hrlich \u00fcber 1.000 Kundenprojekte. Unsere Expertise erstreckt sich \u00fcber verschiedene Branchen wie Chemie, Pharma, Mineral\u00f6l sowie Ver- und Entsorgung. Vertrauen Sie auf die weyer Gruppe f\u00fcr ma\u00dfgeschneiderte Engineering- und Consulting-L\u00f6sungen, die Ihre Anforderungen in puncto Sicherheit und Effizienz erf\u00fcllen.\",\"email\":\"info@weyer-gruppe.com\",\"telephone\":\"+49 (0) 24 21 \u2013 69 09 1 \u2013 0\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/#\\\/schema\\\/person\\\/565b67e11d499b553c41b08563de2655\",\"name\":\"Juri Lasse Raffetseder\",\"url\":\"https:\\\/\\\/www.weyer-gruppe.com\\\/en\\\/author\\\/juri-lasse-raffetseder\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How do you breach a company's IT security system?","description":"At the weyer gruppe's Colloquium 2020 on 18 June, Mr Martin Wundram will speak about corporate IT security systems in the role of a hacker.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/","og_locale":"en_US","og_type":"article","og_title":"Martin Wundram in the role of a hacker - How do you break through an IT security system? Colloquium 2020","og_description":"At the weyer gruppe's Colloquium 2020 on 18 June, Mr Martin Wundram will speak about corporate IT security systems in the role of a hacker.","og_url":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/","og_site_name":"weyer gruppe","article_publisher":"https:\/\/www.facebook.com\/weyergruppe","article_published_time":"2020-06-10T06:46:27+00:00","article_modified_time":"2021-06-21T05:54:37+00:00","og_image":[{"width":878,"height":494,"url":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg","type":"image\/jpeg"}],"author":"Juri Lasse Raffetseder","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juri Lasse Raffetseder","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#article","isPartOf":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/"},"author":{"name":"Juri Lasse Raffetseder","@id":"https:\/\/www.weyer-gruppe.com\/en\/#\/schema\/person\/565b67e11d499b553c41b08563de2655"},"headline":"Martin Wundram in the role of a hacker &#8211; How do you break through an IT security system? Colloquium 2020","datePublished":"2020-06-10T06:46:27+00:00","dateModified":"2021-06-21T05:54:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/"},"wordCount":543,"publisher":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#organization"},"image":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg","keywords":["corona","Cyber Security","Kolloquium","kolloquiumgoesdigital","Online-Event","Online-Kolloquium","Plant safety","Security Engineering"],"articleSection":["Colloquium 2020","Cyber security in plant security","Cyber security of plants"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/","url":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/","name":"How do you breach a company's IT security system?","isPartOf":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg","datePublished":"2020-06-10T06:46:27+00:00","dateModified":"2021-06-21T05:54:37+00:00","description":"At the weyer gruppe's Colloquium 2020 on 18 June, Mr Martin Wundram will speak about corporate IT security systems in the role of a hacker.","breadcrumb":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#primaryimage","url":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg","contentUrl":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2020\/05\/weyer-gruppe-kolloquium-goes-digital-cyber-security-produktionsanlagen-maschinen-artikelreihe.jpg","width":878,"height":494},{"@type":"BreadcrumbList","@id":"https:\/\/www.weyer-gruppe.com\/en\/2020\/06\/10\/martin-wundram-in-the-role-of-a-hacker-how-do-you-break-through-an-it-security-system-colloquium-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"HOME","item":"https:\/\/www.weyer-gruppe.com\/en\/"},{"@type":"ListItem","position":2,"name":"Colloquium 2020","item":"https:\/\/www.weyer-gruppe.com\/en\/category\/colloquium-2020\/"},{"@type":"ListItem","position":3,"name":"Martin Wundram in the role of a hacker &#8211; How do you break through an IT security system? Colloquium 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.weyer-gruppe.com\/en\/#website","url":"https:\/\/www.weyer-gruppe.com\/en\/","name":"weyer gruppe","description":"komplett. durchdacht.","publisher":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.weyer-gruppe.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.weyer-gruppe.com\/en\/#organization","name":"weyer gruppe","url":"https:\/\/www.weyer-gruppe.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weyer-gruppe.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2019\/07\/logo-weyer-gruppe-de.png","contentUrl":"https:\/\/www.weyer-gruppe.com\/wp-content\/uploads\/2019\/07\/logo-weyer-gruppe-de.png","width":532,"height":513,"caption":"weyer gruppe"},"image":{"@id":"https:\/\/www.weyer-gruppe.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weyergruppe","https:\/\/de.linkedin.com\/company\/weyer-gruppe","https:\/\/www.youtube.com\/channel\/UCmZItECuW56Ih_p501_Bq8A"],"description":"Die weyer gruppe ist seit 1976 Ihr Partner f\u00fcr verfahrenstechnische Anlagenplanung und Anlagensicherheit. Mit einem erfahrenen Team von \u00fcber 190 Mitarbeitern in Deutschland, \u00d6sterreich, Polen und der Schweiz realisieren wir j\u00e4hrlich \u00fcber 1.000 Kundenprojekte. Unsere Expertise erstreckt sich \u00fcber verschiedene Branchen wie Chemie, Pharma, Mineral\u00f6l sowie Ver- und Entsorgung. Vertrauen Sie auf die weyer Gruppe f\u00fcr ma\u00dfgeschneiderte Engineering- und Consulting-L\u00f6sungen, die Ihre Anforderungen in puncto Sicherheit und Effizienz erf\u00fcllen.","email":"info@weyer-gruppe.com","telephone":"+49 (0) 24 21 \u2013 69 09 1 \u2013 0","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/www.weyer-gruppe.com\/en\/#\/schema\/person\/565b67e11d499b553c41b08563de2655","name":"Juri Lasse Raffetseder","url":"https:\/\/www.weyer-gruppe.com\/en\/author\/juri-lasse-raffetseder\/"}]}},"_links":{"self":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/posts\/29593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/comments?post=29593"}],"version-history":[{"count":0,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/posts\/29593\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/media\/25448"}],"wp:attachment":[{"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/media?parent=29593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/categories?post=29593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.weyer-gruppe.com\/en\/wp-json\/wp\/v2\/tags?post=29593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}