{"id":9021,"date":"2021-06-07T13:00:15","date_gmt":"2021-06-07T11:00:15","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=9021"},"modified":"2023-05-17T11:08:39","modified_gmt":"2023-05-17T09:08:39","slug":"it-sad-2021","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/06\/07\/it-sad-2021\/","title":{"rendered":"IT-SAD: IT Security Awareness Days 2021!"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_9021 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_9021')){$('.twoclick_social_bookmarks_post_9021').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2021\\\/06\\\/07\\\/it-sad-2021\\\/\",\"post_id\":9021,\"post_title_referrer_track\":\"IT-SAD%3A+IT+Security+Awareness+Days+2021%21\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_9022\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9022\" class=\"wp-image-9022 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021-300x72.png\" alt=\"IT Security Awareness Days 2021: attend for free and without any registration\" width=\"300\" height=\"72\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021-300x72.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2021\/06\/IT-SAD-2021.png 768w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-9022\" class=\"wp-caption-text\">Online and without any registration \u2013 the IT Security Awareness Days 2021 <br \/>Source: <a href=\"https:\/\/blogs.tu-braunschweig.de\/it\/it-sad-it-security-awareness-days-sommersemester-2021\/\">TU Braunschweig<\/a><\/p><\/div><\/p>\n<p>Trustworthy IT infrastructure is essential these days, especially when it comes to IT security. But did you know that most cyber attacks take advantage of human vulnerabilities? Terms like social engineering and (spear-)fishing are becoming more and more popular. In other words, IT security is not limited to the implementation of a solid IT infrastructure. In fact, the human factor can be the greatest vulnerability. Accordingly, it is particularly crucial to involve every single user and to educate them about the various threats.<\/p>\n<p><!--more--><\/p>\n<h2>Create awareness!<\/h2>\n<p>This year, the <a href=\"https:\/\/blogs.tu-braunschweig.de\/it\/it-sad-it-security-awareness-days-sommersemester-2021\/\">IT Security Awareness Days<\/a> will take place for the first time from June 7th to 18th, 2021. This is a series of online events with lectures on various aspects of IT security. A total of 15 lectures on diverse information security topics will be held during these two weeks. Participants are the TU Braunschweig, TU Darmstadt, Uni Hildesheim, KU Eichst\u00e4tt-Ingolstadt, Uni G\u00f6ttingen\/GWDG, Uni Marburg, Leuphana University of L\u00fcneburg and the University of Applied Sciences Munich. No registration is required for the event. Members of other universities can also attend the lectures without registration.<\/p>\n<h2>The schedule<\/h2>\n<p>The following lectures are planned as part of the Security Awareness Days:<\/p>\n<ul>\n<li>07.06., 10:00: <strong>Information security in the home office<\/strong> (Arne Windeler, TU Braunschweig)<\/li>\n<li>08.06., 10:00: <strong>Secure handling of (research) data<\/strong> (Lukas H\u00e4rter, Uni Marburg)<\/li>\n<li>08.06., 14:00: <strong>Guided Online Tours of the Online Tools of the GITZ <\/strong>(Leonard-Jari Zurek, Christian B\u00f6ttger, TU Braunschweig)<\/li>\n<li>09.06., 15:00: <strong>How do I tell my employees? <\/strong>(Rainer Gerling, Munich University of Applied Sciences)<\/li>\n<li>10.06., 15:00: <strong>E-mail security \/ Phishing<\/strong> (Christian B\u00f6ttger, TU Braunschweig)<\/li>\n<li>11.06., 10:00: <strong>Backup and Restore<\/strong> (Susan Roesner, Uni Hildesheim)<\/li>\n<li>14.06., 14:00: <strong>Secure Passwords<\/strong> (Christian B\u00f6ttger, TU Braunschweig)<\/li>\n<li>14.06., 15:00: <strong>Security in WLAN<\/strong> (Steffen Klemer, GWDG)<\/li>\n<li>15.06., 14:00: <strong>Pitfalls of everyday life<\/strong> (Bernhard Brandel, KU Eichst\u00e4dt-Ingolstadt)<\/li>\n<li>15.06., 15:00: <strong>The 11 golden rules of IT security<\/strong> (Christian B\u00f6ttger, TU Braunschweig)<\/li>\n<li>16.06., 11:00: <strong>Messenger &#8211; Data Protection and IT Security<\/strong> (Holger Beck, Uni G\u00f6ttingen\/GWDG)<\/li>\n<li>17.06., 10:00: <strong>Emotet &#8211; A Case Study for Threats<\/strong> (Christian B\u00f6ttger, TU Braunschweig)<\/li>\n<li>17.06., 11:00: <strong>S\/MIME &#8211; Digital Signing for E-mail and Documents<\/strong> (Jochen Becker, TU Darmstadt)<\/li>\n<li>18.06., 10:00: <strong>The 4\u00d74 of the most widespread IT security fallacies<\/strong> (Christian B\u00f6ttger, TU Braunschweig)<\/li>\n<li>18.06., 11:00: <strong>Security for Windows workstations<\/strong> (Susan Roesner, Uni Hildesheim)<\/li>\n<\/ul>\n<p>This wide range of topics offers something for everyone. To attend the event, all you need to do is enter the <a href=\"https:\/\/webconf.tu-bs.de\/chr-39j-x4g\">designated web conference room<\/a>. All lectures will be held in german language. You can&#8217;t attend this event but would still like to learn more about IT security? Well, that&#8217;s no problem! We regularly provide information on various security threats in our blog as well. You can find a selection of articles on IT security from our blog via the tag <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/it-sicherheit\/\">IT security<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/IT-Center\/Team\/~epvp\/Mitarbeiter-CAMPUS-\/?gguid=0x2C5E1B0A3DA32A45AB293A42E93EEC07&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":2051,"featured_media":9022,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[306,308,314],"tags":[81,61],"class_list":["post-9021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ankuendigungen","category-events-jubilaen-erfolge","category-it-sicherheit","tag-it-security","tag-it-sicherheit"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/9021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/2051"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=9021"}],"version-history":[{"count":7,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/9021\/revisions"}],"predecessor-version":[{"id":15598,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/9021\/revisions\/15598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/9022"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=9021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=9021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=9021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}