{"id":37740,"date":"2024-11-13T04:57:23","date_gmt":"2024-11-13T12:57:23","guid":{"rendered":"https:\/\/pathlock.com\/?post_type=resource&#038;p=37740"},"modified":"2024-11-13T05:01:04","modified_gmt":"2024-11-13T13:01:04","slug":"it-security-threat-detection-intelligent-weitergedacht","status":"publish","type":"resource","link":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/","title":{"rendered":"[Digitalevent] IT Security: Threat Detection intelligent weitergedacht"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-it-daily-we-secure-it\">it-daily | We secure IT.<\/h2>\n\n\n\n<p>Cyber-Bedrohungen werden immer raffinierter und komplexer. Unternehmen m\u00fcssen innovative IT-Sicherheitskonzepte entwickeln, um sich wirksam zu sch\u00fctzen. Diese Herausforderung wird durch die sich st\u00e4ndig weiterentwickelnden Methoden der Cyberkriminellen noch verst\u00e4rkt.<\/p>\n\n\n\n<p>Dabei ist die Reaktionszeit oft der entscheidende Faktor bei der Schadensbegrenzung. Klassisch werden Risikosituationen jedoch zun\u00e4chst von Experten bewertet und erst dann Gegenma\u00dfnahmen ergriffen \u2013 das kostet wertvolle Zeit. <strong>Threat Intelligence<\/strong> ist die weitreichende Erg\u00e4nzung etablierter L\u00f6sungen, mit ihr sind Sie in der Lage, noch schneller fundierte Entscheidungen zu treffen. <\/p>\n\n\n\n<p>Im Rahmen des Digitalevents \u201eWe secure IT\u201c geben Raphael Kelbert und Jonathan Stross einen Einblick, wie Sie mit automatisierten Prozessen genau auf das erkannte Risiko reagieren k\u00f6nnen. Die Bedrohungserkennung wird durch maschinelles Lernen verbessert und Sie k\u00f6nnen ganz gezielt Priorit\u00e4ten setzen.<\/p>\n\n\n\n<p><p><strong>Moderatoren: <\/strong><br>Raphael Kelbert, Threat Detection &amp; Response (Pathlock Deutschland)<br>Jonathan Stross, Solution Engineer IT Security (Pathlock Deutschland)<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>it-daily | We secure IT. Cyber-Bedrohungen werden immer raffinierter und komplexer. Unternehmen m\u00fcssen innovative IT-Sicherheitskonzepte entwickeln, um sich wirksam zu sch\u00fctzen. Diese Herausforderung wird durch die sich st\u00e4ndig weiterentwickelnden Methoden der Cyberkriminellen noch verst\u00e4rkt. Dabei ist die Reaktionszeit oft der entscheidende Faktor bei der Schadensbegrenzung. Klassisch werden Risikosituationen jedoch zun\u00e4chst von Experten bewertet und erst&#8230;<\/p>\n","protected":false},"author":59,"featured_media":37026,"parent":0,"template":"","categories":[],"content_type":[158],"topic":[444,554],"erp-solutions":[1015],"magazines":[],"analyst-firm":[],"class_list":["post-37740","resource","type-resource","status-publish","has-post-thumbnail","hentry","content_type-on-demand-webinar","topic-application-security","topic-sap-security","erp-solutions-sap-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Digitalevent | IT Security: Threat Detection intelligent weitergedacht<\/title>\n<meta name=\"description\" content=\"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digitalevent | IT Security: Threat Detection intelligent weitergedacht\" \/>\n<meta property=\"og:description\" content=\"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/\" \/>\n<meta property=\"og:site_name\" content=\"Pathlock\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T13:01:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Digitalevent | IT Security: Threat Detection intelligent weitergedacht\" \/>\n<meta name=\"twitter:description\" content=\"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!\" \/>\n<meta name=\"twitter:site\" content=\"@pathlock\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/\",\"name\":\"Digitalevent | IT Security: Threat Detection intelligent weitergedacht\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp\",\"datePublished\":\"2024-11-13T12:57:23+00:00\",\"dateModified\":\"2024-11-13T13:01:04+00:00\",\"description\":\"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp\",\"width\":2560,\"height\":1435,\"caption\":\"Webinar Threat Intelligence. We secure IT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/resource\\\/it-security-threat-detection-intelligent-weitergedacht\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Digitalevent] IT Security: Threat Detection intelligent weitergedacht\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"name\":\"Pathlock\",\"description\":\"The Leader in Application Security and Controls Automation\",\"publisher\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pathlock.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#organization\",\"name\":\"Pathlock, Inc\",\"url\":\"https:\\\/\\\/pathlock.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"contentUrl\":\"https:\\\/\\\/pathlock.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Zrzut-ekranu-2021-11-17-o-10.56.42.png\",\"width\":460,\"height\":148,\"caption\":\"Pathlock, Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/pathlock.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/pathlock\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pathlock\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgo4izMJ70K4gnyWQ_mP-OA\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digitalevent | IT Security: Threat Detection intelligent weitergedacht","description":"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/","og_locale":"de_DE","og_type":"article","og_title":"Digitalevent | IT Security: Threat Detection intelligent weitergedacht","og_description":"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!","og_url":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/","og_site_name":"Pathlock","article_modified_time":"2024-11-13T13:01:04+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Digitalevent | IT Security: Threat Detection intelligent weitergedacht","twitter_description":"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!","twitter_site":"@pathlock","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/","url":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/","name":"Digitalevent | IT Security: Threat Detection intelligent weitergedacht","isPartOf":{"@id":"https:\/\/pathlock.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/#primaryimage"},"image":{"@id":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/#primaryimage"},"thumbnailUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp","datePublished":"2024-11-13T12:57:23+00:00","dateModified":"2024-11-13T13:01:04+00:00","description":"We secure IT Digitalevent: Wie Sie Ihre Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern k\u00f6nnen!","breadcrumb":{"@id":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/#primaryimage","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp","width":2560,"height":1435,"caption":"Webinar Threat Intelligence. We secure IT"},{"@type":"BreadcrumbList","@id":"https:\/\/pathlock.com\/de\/resource\/it-security-threat-detection-intelligent-weitergedacht\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pathlock.com\/de\/"},{"@type":"ListItem","position":2,"name":"[Digitalevent] IT Security: Threat Detection intelligent weitergedacht"}]},{"@type":"WebSite","@id":"https:\/\/pathlock.com\/de\/#website","url":"https:\/\/pathlock.com\/de\/","name":"Pathlock","description":"The Leader in Application Security and Controls Automation","publisher":{"@id":"https:\/\/pathlock.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pathlock.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/pathlock.com\/de\/#organization","name":"Pathlock, Inc","url":"https:\/\/pathlock.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","contentUrl":"https:\/\/pathlock.com\/wp-content\/uploads\/2021\/11\/Zrzut-ekranu-2021-11-17-o-10.56.42.png","width":460,"height":148,"caption":"Pathlock, Inc"},"image":{"@id":"https:\/\/pathlock.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/pathlock","https:\/\/www.linkedin.com\/company\/pathlock","https:\/\/www.youtube.com\/channel\/UCgo4izMJ70K4gnyWQ_mP-OA"]}]}},"ACF":{"hero_image":{"ID":37026,"id":37026,"title":"Webinar Threat Intelligence. We secure IT","filename":"Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp","filesize":216778,"url":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-scaled.webp","link":"https:\/\/pathlock.com\/de\/events-webinare\/artificial-intelligence-business-man-shaking-hand-with-digital-partner-machine-on-abstract-cyber-technology-background-network-security-partnership-investor-partner-financial-connection-concept\/","alt":"Webinar Threat Intelligence. We secure IT","author":"39","description":"Webinar Threat Intelligence. We secure IT","caption":"","name":"artificial-intelligence-business-man-shaking-hand-with-digital-partner-machine-on-abstract-cyber-technology-background-network-security-partnership-investor-partner-financial-connection-concept","status":"inherit","uploaded_to":31950,"date":"2024-07-30 13:14:56","modified":"2024-07-30 13:15:46","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/pathlock.com\/wp-includes\/images\/media\/default.png","width":2560,"height":1435,"sizes":{"thumbnail":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-150x150.webp","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-300x168.webp","medium-width":300,"medium-height":168,"medium_large":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-768x430.webp","medium_large-width":768,"medium_large-height":430,"large":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-1024x574.webp","large-width":1024,"large-height":574,"1536x1536":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-1536x861.webp","1536x1536-width":1536,"1536x1536-height":861,"2048x2048":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-2048x1148.webp","2048x2048-width":2048,"2048x2048-height":1148,"menu-nav-img":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-112x112.webp","menu-nav-img-width":112,"menu-nav-img-height":112,"menu-nav-img-company":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-292x138.webp","menu-nav-img-company-width":292,"menu-nav-img-company-height":138,"big-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-724x435.webp","big-promoted-resoruces-post-width":724,"big-promoted-resoruces-post-height":435,"small-promoted-resoruces-post":"https:\/\/pathlock.com\/wp-content\/uploads\/2024\/07\/Threat-Intelligence_Fachartikel_AdobeStock_733987332-294x178.webp","small-promoted-resoruces-post-width":294,"small-promoted-resoruces-post-height":178}},"is_section_explore_industry_thought_leadership":true,"case_study":"resource","video_or_pdf_download":"video","intro_details_page":"In diesem Vortrag erfahren Sie, wie Sie die Bedrohungserkennung durch automatisierte Prozesse und maschinelles Lernen verbessern und somit gezielt Priorit\u00e4ten setzen k\u00f6nnen.","youtube_embed_src":"https:\/\/www.youtube.com\/embed\/Q_rS1GS6g5w","video_cover":false,"video_duration":"25 min.","form_id":"ace5c455-1773-45bd-97cd-32cf4753afd5","sfdc_campaign_id":""},"_links":{"self":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource\/37740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/users\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media\/37026"}],"wp:attachment":[{"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/media?parent=37740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/categories?post=37740"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/content_type?post=37740"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/topic?post=37740"},{"taxonomy":"erp-solutions","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/erp-solutions?post=37740"},{"taxonomy":"magazines","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/magazines?post=37740"},{"taxonomy":"analyst-firm","embeddable":true,"href":"https:\/\/pathlock.com\/de\/wp-json\/wp\/v2\/analyst-firm?post=37740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}