{"id":24075,"date":"2026-04-20T11:00:40","date_gmt":"2026-04-20T09:00:40","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=24075"},"modified":"2026-04-23T10:29:35","modified_gmt":"2026-04-23T08:29:35","slug":"it-sad-it-security-awareness-days-2026","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2026\/04\/20\/it-sad-it-security-awareness-days-2026\/","title":{"rendered":"IT-SAD: IT-Security Awareness Days 2026"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_24075 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_24075')){$('.twoclick_social_bookmarks_post_24075').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2026\\\/04\\\/20\\\/it-sad-it-security-awareness-days-2026\\\/\",\"post_id\":24075,\"post_title_referrer_track\":\"IT-SAD%3A+IT-Security+Awareness+Days+2026\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_11596\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11596\" class=\"wp-image-11596 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD-300x72.png\" alt=\"Logo von IT-SAD\" width=\"300\" height=\"72\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD-300x72.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/04\/IT-SAD.png 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-11596\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.tu-braunschweig.de\/en\/ciso\/translate-to-english-it-security-awareness-days\/\">TU Braunschweig<\/a><\/p><\/div><\/p>\n<p>From April 27 to May 8, 2026, the IT Security Awareness Days will take place for the eleventh time. During these two weeks, a total of 13 online lectures on the topic of IT security will be held. These are organized by various universities. The following institutions are participating (though not always with own presentations): TU Braunschweig, TU Darmstadt, TU Dresden, University of Hildesheim, KU Eichst\u00e4tt-Ingolstadt, University of G\u00f6ttingen\/GWDG, University of Marburg, University of Osnabr\u00fcck, Leuphana University L\u00fcneburg, University of Duisburg-Essen, University of Cologne, and Albstadt-Sigmaringen University of Applied Sciences.<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #00549f;\">The Agenda<\/span><\/h3>\n<p>The following presentations are scheduled as part of the IT Security Awareness Days:<\/p>\n<p><strong>April 27, 2026<\/strong><br \/>\n10 am: Insights into the World of Cybercrime (Tobias Scheible, University of Police Baden-W\u00fcrttemberg)<br \/>\n2 pm: Email (In)security (Susan R\u00f6sner, University Hildesheim)<\/p>\n<p><strong>April 28, 2026<\/strong><br \/>\n10 am: Fundamentals of IT Security: How to actively protect yourself at the office and at home. (Anne Bunde, Arne Windeler, TU Braunschweig)<br \/>\n2 pm: Pitfalls of Everyday Life (Bernhard Brandel, Catholic University of Eichst\u00e4tt-Ingolstadt)<\/p>\n<p><strong>April 29, 2026<\/strong><br \/>\n10 am: Ransomware: A Misunderstood Threat? (Jan-Ulrich Holtgrave, Leibniz University Hannover)<\/p>\n<p><strong>April 30, 2026<\/strong><br \/>\n10 am: Phishing Simulations at TU Braunschweig (Arne Windeler, TU Braunschweig)<br \/>\n2 pm: Ransomware Case Study: Emotet\/Quakbot (Christian B\u00f6ttger, TU Braunschweig)<\/p>\n<p><strong>April 5, 2026<\/strong><br \/>\n10 am: Admin \u2013 Hero or Security Risk (Holger Beck, GWDG)<\/p>\n<p><strong>May 6, 2026<\/strong><br \/>\n11 am: AI &amp; Cybersecurity \u2013 Attack Vectors Against LLMs and Chatbots (Alexander Krause, Leibniz University Hannover)<br \/>\n2 pm: Espionage by Insiders Using Hardware (Tobias Scheible, University of Police Baden-W\u00fcrttemberg)<\/p>\n<p><strong>May 7, 2026<\/strong><br \/>\n10 am: A Shift in Perspective: How People Become Part of the Solution (Alexandra von Preuschen, Leibniz University Hannover)<br \/>\n2 pm: Challenges in Everyday Digital Life \u2013 Understanding and Using 2FA, MFA, and More (Susan R\u00f6sner, University Hildesheim)<\/p>\n<p><strong>May 8, 2026<\/strong><br \/>\n11 am: Navigating Cyberspace (Rebecca Finster, TU Braunschweig)<\/p>\n<p>Unless explicitly stated otherwise, no registration is required to participate. Participants from other universities are also warmly invited to attend these events. All presentations will be held in a designated Webex conference room. Further details about the individual presentations and how to participate can be found on the <a href=\"https:\/\/www.tu-braunschweig.de\/ciso\/it-sad\/it-sad-sommersemester-2026\">TU Braunschweig website<\/a>.<\/p>\n<p>Want to learn more about IT security? You can find all our posts on this topic under the tag <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/it-sicherheit\/\">IT Security<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-pvz-\/?gguid=PER-SJZ2SS3&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":2228,"featured_media":11596,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[308],"tags":[81,358,61],"class_list":["post-24075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-jubilaen-erfolge","tag-it-security","tag-it-sad","tag-it-sicherheit"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/24075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/2228"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=24075"}],"version-history":[{"count":5,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/24075\/revisions"}],"predecessor-version":[{"id":24080,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/24075\/revisions\/24080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/11596"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=24075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=24075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=24075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}