{"id":36461,"date":"2024-07-05T08:23:32","date_gmt":"2024-07-05T15:23:32","guid":{"rendered":"https:\/\/pathlock.com\/?post_type=resource&#038;p=36461"},"modified":"2025-10-10T07:39:25","modified_gmt":"2025-10-10T14:39:25","slug":"wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2","status":"publish","type":"resource","link":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/","title":{"rendered":"[CSK Summit] Die wichtigsten Bausteine einer Zero Trust-Strategie im Hinblick auf NIS-2"},"content":{"rendered":"\n<p>Sp\u00e4testens mit der neuen Richtlinie NIS-2 droht Unternehmen, die in Sachen IT-Sicherheit noch nicht einmal die grundlegendsten Hausaufgaben gemacht haben, ein b\u00f6ses Erwachen. Und neue Technologien wie Cloud-Applikationen oder KI potenzieren die Komplexit\u00e4t zus\u00e4tzlich. H\u00f6chste Zeit also, die eigenen Abwehrma\u00dfnahmen auf ein neues Niveau zu heben!<\/p>\n\n\n\n<p>In unserem Beitrag im Rahmen des CSK Summit zeigen wir Ihnen, wo Sie ansetzen k\u00f6nnen und wie Sie die kommenden Herausforderungen priorisieren sollten. Dabei lassen wir Sie an unseren Erfahrungen aus zahlreichen Projekten f\u00fcr KRITIS-Unternehmen teilhaben.<\/p>\n\n\n\n<p><strong>Schwerpunkte des Vortrages:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Warum Berechtigungskonzepte allein nicht ausreichen<\/li>\n\n\n\n<li>Cloud, KI und SIEM \u2013 gehypte Buzzwords, aber keine L\u00f6sung<\/li>\n\n\n\n<li>Wie Sie einen zuverl\u00e4ssigen Zero Trust-Prozess schaffen<\/li>\n\n\n\n<li>Warum Threat Intelligence der Game Changer f\u00fcr Ihre IT-Security sein k\u00f6nnte<\/li>\n<\/ul>\n\n\n\n<p><strong>Moderatoren<\/strong>:\u200b<br>\u200bJonathan Stross | Solution Engineer IT Security<strong> <\/strong>|<strong> <\/strong>Pathlock Deutschland<br>Ralph Kempf | Gesch\u00e4ftsf\u00fchrer<strong> <\/strong>|<strong> <\/strong>Pathlock Deutschland<\/p>\n\n\n\n<p><strong>Veranstalter:\u200b<\/strong><br>Datakontext | CSK SUMMIT III 2024 | Zero Trust \/ NIS-2 online Konferenz<\/p>\n\n\n\n<p><strong>Weitere Informationen erhalten Sie in unserem Blogbeitrag:<\/strong><a href=\"https:\/\/pathlock.com\/de\/nis-2-mehr-als-ein-buzzword-intelligentes-risikomanagement-ist-gefragt\/\"> https:\/\/pathlock.com\/de\/nis-2-mehr-als-ein-buzzword-intelligentes-risikomanagement-ist-gefragt\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sp\u00e4testens mit der neuen Richtlinie NIS-2 droht Unternehmen, die in Sachen IT-Sicherheit noch nicht einmal die grundlegendsten Hausaufgaben gemacht haben, ein b\u00f6ses Erwachen. Und neue Technologien wie Cloud-Applikationen oder KI potenzieren die Komplexit\u00e4t zus\u00e4tzlich. H\u00f6chste Zeit also, die eigenen Abwehrma\u00dfnahmen auf ein neues Niveau zu heben! In unserem Beitrag im Rahmen des CSK Summit zeigen&#8230;<\/p>\n","protected":false},"author":59,"featured_media":36910,"parent":0,"template":"","categories":[],"content_type":[158],"topic":[554,636,157],"erp-solutions":[1015],"magazines":[],"analyst-firm":[],"class_list":["post-36461","resource","type-resource","status-publish","has-post-thumbnail","hentry","content_type-on-demand-webinar","topic-sap-security","topic-zero-risk","topic-zero-trust","erp-solutions-sap-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2<\/title>\n<meta name=\"description\" content=\"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust-Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2\" \/>\n<meta property=\"og:description\" content=\"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-10T14:39:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1112\" \/>\n\t<meta property=\"og:image:height\" content=\"638\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2\" \/>\n<meta name=\"twitter:description\" content=\"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/\",\"name\":\"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Bausteine_pur-jpg.webp\",\"datePublished\":\"2024-07-05T15:23:32+00:00\",\"dateModified\":\"2025-10-10T14:39:25+00:00\",\"description\":\"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust-Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Bausteine_pur-jpg.webp\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Bausteine_pur-jpg.webp\",\"width\":1112,\"height\":638,\"caption\":\"Bausteine Strategie Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[CSK Summit] Die wichtigsten Bausteine einer Zero Trust-Strategie im Hinblick auf NIS-2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2","description":"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust-Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/","og_locale":"de_DE","og_type":"article","og_title":"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2","og_description":"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!","og_url":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/","og_site_name":"Pathlock","article_modified_time":"2025-10-10T14:39:25+00:00","og_image":[{"width":1112,"height":638,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2","twitter_description":"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!","twitter_image":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","twitter_site":"@pathlock","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/","url":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/","name":"Die wichtigsten Bausteine einer Zero Trust-Strategie f\u00fcr NIS-2","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","datePublished":"2024-07-05T15:23:32+00:00","dateModified":"2025-10-10T14:39:25+00:00","description":"Im Webinar erfahren Sie, wie Sie mit Threat Intelligence einen sicheren Zero Trust-Prozess aufbauen. Der Game Changer f\u00fcr Ihre IT-Security!","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","width":1112,"height":638,"caption":"Bausteine Strategie Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"[CSK Summit] Die wichtigsten Bausteine einer Zero Trust-Strategie im Hinblick auf NIS-2"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":{"hero_image":{"ID":36910,"id":36910,"title":"Bausteine Strategie Cybersecurity","filename":"Bausteine_pur-jpg.webp","filesize":29862,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","link":"https:\/\/pathlock.com\/de\/resource\/wichtigsten-bausteine-einer-zero-trust-strategie-hinsichtlich-nis2\/bausteine_pur\/","alt":"Bausteine Strategie Cybersecurity","author":"39","description":"Bausteine Strategie Cybersecurity ","caption":"","name":"bausteine_pur","status":"inherit","uploaded_to":36461,"date":"2024-07-16 13:01:43","modified":"2024-07-16 13:02:47","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":1112,"height":638,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-150x150.webp","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-300x172.webp","medium-width":300,"medium-height":172,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-768x441.webp","medium_large-width":768,"medium_large-height":441,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-1024x588.webp","large-width":1024,"large-height":588,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","1536x1536-width":1112,"1536x1536-height":638,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-jpg.webp","2048x2048-width":1112,"2048x2048-height":638,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-112x112.webp","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-292x138.webp","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-724x435.webp","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Bausteine_pur-294x178.webp","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"is_section_explore_industry_thought_leadership":true,"case_study":"resource","video_or_pdf_download":"video","intro_details_page":"In diesem Vortrag zeigen wir Ihnen, wie Sie Ihre eigenen Abwehrma\u00dfnahmen auf ein neues Niveau heben und einen zuverl\u00e4ssigen Zero Trust-Prozess aufbauen.","youtube_embed_src":"https:\/\/www.youtube-nocookie.com\/embed\/oDzf1iAMhEQ","video_cover":false,"video_duration":"24 min.","form_id":"a148396c-2245-4a5e-a401-c4223bd20f76","sfdc_campaign_id":""},"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource\/36461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media\/36910"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=36461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/categories?post=36461"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/content_type?post=36461"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/topic?post=36461"},{"taxonomy":"erp-solutions","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/erp-solutions?post=36461"},{"taxonomy":"magazines","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/magazines?post=36461"},{"taxonomy":"analyst-firm","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/analyst-firm?post=36461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}