{"id":18360,"date":"2025-12-17T12:54:38","date_gmt":"2025-12-17T12:54:38","guid":{"rendered":"https:\/\/result-group.com\/?p=18360"},"modified":"2026-01-26T09:15:27","modified_gmt":"2026-01-26T09:15:27","slug":"2-fachtagung-cyberangriff-in-leipzig","status":"publish","type":"post","link":"https:\/\/result-group.com\/en\/2nd-cyberattack-conference-in-leipzig\/","title":{"rendered":"2nd Symposium on Cyber Attacks in Leipzig"},"content":{"rendered":"<p><strong><br>Thursday, February 26, 202<\/strong>6<br><strong><strong>Leipzig Zoo<\/strong><\/strong><\/p>\n\n\n\n<p>As part of the renowned &quot;Cyber Attack&quot; conference organized by the dfv Media Group and R &amp; V, a special exchange took place in an extraordinary setting: <br>In the middle of Gondwanaland at Leipzig Zoo, leading experts discuss current developments and challenges in the context of digital attack scenarios.<\/p>\n\n\n\n<p>Our managing director, Axel Wochinger, has been invited as a speaker and will shed light on the topic. <strong>Topic: \u201eNegotiating with blackmailers \u2013 experiences, tactics and typical mistakes\u201c<\/strong> From the perspective of an internationally active crisis management team. Its perspective is based on over 25 years of practical experience in managing critical security situations and discreetly handling complex extortion and cyber incidents worldwide.<\/p>\n\n\n\n<p>The conference unites <strong>technical, legal, operational and communicative dimensions of a cyberattack <\/strong>and offers experts from business, administration and security circles sound insights, practical case studies and space for confidential exchange.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Program topics<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Case Study: Experiences in crisis management and crisis communication from a recent cyberattack<\/li>\n\n\n\n<li>Legal perspectives: The importance of data protection, data security and liability in the event of a cyberattack<\/li>\n\n\n\n<li>Incident Response and Forensics: How IT Experts Can Help in an Emergency<\/li>\n\n\n\n<li>Negotiations: Communication and negotiations with organized criminals<\/li>\n\n\n\n<li>Authorities: The perspective of regulatory and investigative authorities on the threat scenario and individual attacks<\/li>\n\n\n\n<li>Hybrid threat: Classifying cyberattacks as part of a combined strategy of world politics and warfare<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a href=\"https:\/\/www.ruw-fachkonferenzen.de\/website\/images\/2.-Fachtagung-Cyber-Angriff_Programm.pdf\" data-type=\"link\" data-id=\"https:\/\/www.ruw-fachkonferenzen.de\/website\/images\/2.-Fachtagung-Cyber-Angriff_Programm.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Program overview<\/a><br><br><a href=\"https:\/\/www.ruw-fachkonferenzen.de\/veranstaltung\/fachtagung-cyber-angriff-2\/\" data-type=\"link\" data-id=\"https:\/\/www.ruw-fachkonferenzen.de\/veranstaltung\/fachtagung-cyber-angriff-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Detailed information and registration can be found on the website of the organizer, dfv Mediengruppe \/ Law &amp; Finance Conferences.<\/a><br><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><br>A limited number of discounted tickets are available for personal contacts of the Result Group. <strong>Voucher code \u201eSpeaker recommendation\u201c<\/strong> receive <strong>\u20ac100 discount<\/strong> on the participation fee.<br><br><br><\/p>\n<\/blockquote>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Thursday, February 26, 2026 at Leipzig Zoo<\/p>","protected":false},"author":2,"featured_media":18362,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"2. Fachtagung Cyberangriff in Leipzig","_seopress_titles_desc":"Mitten im Gondwanaland des Leipziger Zoos sprechen f\u00fchrende Expertinnen und Experten \u00fcber aktuelle Entwicklungen und Herausforderungen im Kontext digitaler Angriffsszenarien.","_seopress_robots_index":"","footnotes":""},"categories":[22],"tags":[95,97,149,148,113,146,129,147],"class_list":{"0":"post-18360","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-events","8":"tag-cyberangriff","9":"tag-cyberattacke","10":"tag-forensik","11":"tag-hybride-bedrohung","12":"tag-krisenmanagement","13":"tag-leipzig","14":"tag-verhandlungen","15":"tag-zoo-leipzig"},"_links":{"self":[{"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/posts\/18360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/comments?post=18360"}],"version-history":[{"count":5,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/posts\/18360\/revisions"}],"predecessor-version":[{"id":18489,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/posts\/18360\/revisions\/18489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/media\/18362"}],"wp:attachment":[{"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/media?parent=18360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/categories?post=18360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/result-group.com\/en\/wp-json\/wp\/v2\/tags?post=18360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}