{"id":23179,"date":"2025-11-03T11:00:26","date_gmt":"2025-11-03T10:00:26","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=23179"},"modified":"2025-10-29T16:54:34","modified_gmt":"2025-10-29T15:54:34","slug":"it-sad-it-security-awareness-days-2025","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2025\/11\/03\/it-sad-it-security-awareness-days-2025\/","title":{"rendered":"IT-SAD: IT-Security Awareness Days 2025"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_23179 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_23179')){$('.twoclick_social_bookmarks_post_23179').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2025\\\/11\\\/03\\\/it-sad-it-security-awareness-days-2025\\\/\",\"post_id\":23179,\"post_title_referrer_track\":\"IT-SAD%3A+IT-Security+Awareness+Days+2025\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_9022\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9022\" class=\"size-medium wp-image-9022\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021-300x72.png\" alt=\"Logo der IT Security Awareness Days\" width=\"300\" height=\"72\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021-300x72.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021.png 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-9022\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.tu-braunschweig.de\/ciso\/it-sad\/\">TU Braunschweig<\/a><\/p><\/div><\/p>\n<p>From November 3 to November 14, 2025, the IT Security Awareness Days will take place for the tenth time. During these two weeks, a total of 18 online lectures on the topic of IT security will be held. These are organized by various universities.<\/p>\n<p>The following institutions are involved (although not always with their own presentations): TU Braunschweig, TU Darmstadt, TU Dresden, University of Hildesheim, KU Eichst\u00e4tt-Ingolstadt, University of G\u00f6ttingen\/GWDG, University of Marburg, University of Osnabr\u00fcck, Leuphana University L\u00fcneburg, University of Duisburg-Essen, University of Cologne, and Albstadt-Sigmaringen University of Applied Sciences.<\/p>\n<p><!--more--><\/p>\n<h3><\/h3>\n<h3><span style=\"color: #00549f;\">The Agenda<\/span><\/h3>\n<p><strong>November 3, 2025<\/strong><br \/>\n11am: IT Security in Homeoffice (Arne Windeler)<br \/>\n2pm: 11 Golden Rules of Information Security (Christian B\u00f6ttger)<\/p>\n<p><strong>November 4, 2025<\/strong><br \/>\n10am: Essential Guide to Email Security and Phishing (EN) (Susan Roesner)<br \/>\n2pm: Beware of traps! Hackers, Thieves, Social Engineers (Holger Beck)<\/p>\n<p><strong>November 5, 2025<\/strong><br \/>\n10am: Messenger \u2013 Data Protection and Information Security (Holger Beck)<br \/>\n11am: Data Protection in Research Projects (Stephan Rehfeld)<br \/>\n2pm: The 4&#215;4 Most Important Security Mistakes (Christian B\u00f6ttger)<\/p>\n<p><strong>November 6, 2025<\/strong><br \/>\n10am: Information Security 101 (EN) (Susan Roesner)<br \/>\n2pm: Once Upon a Time&#8230; IT Security (Andreas Leder)<\/p>\n<p><strong>November 10, 2025<\/strong><br \/>\n10am: Attacks by Internal Perpetrators Using Hardware (Tobias Scheible)<br \/>\n11am: Phishing Simulations at TU Braunschweig (Arne Windeler)<\/p>\n<p><strong>November 11, 2025<\/strong><br \/>\n10am: Handling Passwords (Christian B\u00f6ttger)<\/p>\n<p><strong>November 12, 2025<\/strong><br \/>\n11am: Pitfalls of Everyday Life (Bernhard Brandel)<br \/>\n2pm: Dangers of Email and How to Defend Against Them (Christian B\u00f6ttger)<\/p>\n<p><strong>November 13, 2025<\/strong><br \/>\n11am: Ransomware Case Study: Emotet\/Quakbot (Christian B\u00f6ttger)<\/p>\n<p><strong>November 14, 2025<\/strong><br \/>\n10am: AI and Security (Jan-Ulrich Holtgrave)<br \/>\n11am: Dangers Posed by Malicious USB Hardware (Tobias Scheible)<br \/>\n2pm: Safe Surfing \u2013 The \u201cBest Of\u201d Privacy Add-Ons (Irmi Bolt)<\/p>\n<p>Unless explicitly stated otherwise, no registration is required to participate. Participants from other universities are also welcome to attend these events. All lectures will be held in a dedicated Webex conference room. Further details on the individual lectures and participation can be found on the <a href=\"https:\/\/www.tu-braunschweig.de\/ciso\/it-sad\/it-sad-wintersemester-2025\/26\">TU Braunschweig website<\/a>.<\/p>\n<p>You would like to learn more about IT security? You can find all our articles on this topic under the <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/it-sicherheit\/\">IT Security tag<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?gguid=PER-SJZ2SS3&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":2228,"featured_media":9022,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[306,308,314],"tags":[256,81,61],"class_list":["post-23179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ankuendigungen","category-events-jubilaen-erfolge","category-it-sicherheit","tag-events","tag-it-security","tag-it-sicherheit"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/23179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/2228"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=23179"}],"version-history":[{"count":5,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/23179\/revisions"}],"predecessor-version":[{"id":23189,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/23179\/revisions\/23189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/9022"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=23179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=23179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=23179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}