{"id":2655,"date":"2018-06-25T15:38:13","date_gmt":"2018-06-25T15:38:13","guid":{"rendered":"https:\/\/cyberrange.at\/referenz-projekte\/"},"modified":"2026-03-09T13:27:18","modified_gmt":"2026-03-09T13:27:18","slug":"referenz-projekte","status":"publish","type":"page","link":"https:\/\/cyberrange.at\/de\/referenz-projekte\/","title":{"rendered":"Referenz-Projekte"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2655\" class=\"elementor elementor-2655 elementor-79\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ce7f258 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ce7f258\" data-element_type=\"section\" data-e-type=\"section\" id=\"intro\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bd587c1\" data-id=\"bd587c1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e6384e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e6384e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38c5880\" data-id=\"38c5880\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8149738 elementor-inner-section-10 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8149738\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8ffd5c9\" data-id=\"8ffd5c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c16a66 elementor-widget elementor-widget-heading\" data-id=\"3c16a66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Referenz-Projekte<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ba94d41\" data-id=\"ba94d41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5d2548 elementor-widget elementor-widget-image\" data-id=\"c5d2548\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"680\" height=\"118\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/dark_stripes_1.svg\" class=\"attachment-full size-full wp-image-2636\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-58e3509 elementor-widget elementor-widget-html\" data-id=\"58e3509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34f37ca elementor-widget elementor-widget-heading\" data-id=\"34f37ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Regionaler IAEA-Schulungskurs \u00fcber Computersicherheit f\u00fcr Instrumentierungs- und Kontrollsysteme f\u00fcr kerntechnische Anlagen<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-33333ab elementor-section-full_width elementor-inner-section-15 elementor-section-height-default elementor-section-height-default\" data-id=\"33333ab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-de9e1cf\" data-id=\"de9e1cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-469f12a elementor-widget elementor-widget-image\" data-id=\"469f12a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1074\" height=\"207\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/iaea-logo.png\" class=\"attachment-full size-full wp-image-2658\" alt=\"\" srcset=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/iaea-logo.png 1074w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/iaea-logo-300x58.png 300w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/iaea-logo-1024x197.png 1024w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/iaea-logo-768x148.png 768w\" sizes=\"(max-width: 1074px) 100vw, 1074px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6bd868d\" data-id=\"6bd868d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20a5fcf elementor-widget elementor-widget-text-editor\" data-id=\"20a5fcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Im Rahmen der laufenden Zusammenarbeit zwischen der Internationalen Atomenergiebeh\u00f6rde (IAEA) und dem AIT als ernanntes IAEA-Kollaborationszentrum f\u00fcr Informations- und Computersicherheit f\u00fcr nukleare Sicherheit veranstaltet letzteres j\u00e4hrlich einen einw\u00f6chigen Schulungskurs in seinen Schulungsr\u00e4umen in Wien. Der Kurs konzentriert sich auf die Cybersicherheit industrieller Kontrollsysteme, die in kerntechnischen Anlagen und solchen, die mit radioaktivem Material in Verbindung stehen, wie z.B. Krankenh\u00e4user und Forschungseinrichtungen, zu finden sind. In dem Kurs werden mehrere Themen behandelt, darunter die Analyse von Sicherheitsanforderungen, defensive Computersicherheitsarchitekturen (d.h. Verteidigung in der Tiefe) und technisches Schwachstellenmanagement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6d8f464\" data-id=\"6d8f464\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cff78d0 elementor-widget elementor-widget-text-editor\" data-id=\"cff78d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Der Kurs hat eine starke praktische Komponente. Die Teilnehmer f\u00fchren \u00dcbungen an repr\u00e4sentativen Ger\u00e4ten durch, die in kerntechnischen Anlagen zu finden sind, wie z.B. speicherprogrammierbare Steuerungen (PLCs) und Zugangskontrollsysteme. Dar\u00fcber hinaus f\u00fchrt AIT einen technischen Vertrag mit der IAEA durch, um mehrere praktische \u00dcbungen zu entwickeln, die die AIT Cyber Range nutzen, damit die Teilnehmer aus der Ferne \u00dcbungen an repr\u00e4sentativen virtualisierten Systemen durchf\u00fchren k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-795be7f elementor-section-full_width elementor-inner-section-15 elementor-section-height-default elementor-section-height-default\" data-id=\"795be7f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9f6b90a\" data-id=\"9f6b90a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-331d1c8\" data-id=\"331d1c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-facb076 elementor-widget elementor-widget-image\" data-id=\"facb076\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1536\" height=\"1029\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/FVZ6289_withoutLogo-1536x1029.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-2662\" alt=\"Cyber Range, Cyber Security Training-Raum\" srcset=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/FVZ6289_withoutLogo-1536x1029.jpg 1536w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/FVZ6289_withoutLogo-300x201.jpg 300w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/FVZ6289_withoutLogo-1024x686.jpg 1024w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/FVZ6289_withoutLogo-768x515.jpg 768w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/FVZ6289_withoutLogo-2048x1372.jpg 2048w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25e6e04 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"25e6e04\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-452eb88\" data-id=\"452eb88\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0823f4d elementor-widget elementor-widget-ucaddon_image_reveal_on_scroll\" data-id=\"0823f4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_image_reveal_on_scroll.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Image Reveal On Scroll -->\n\t\t<link id='uc_ac_assets_file_uc_image_reveal_css_545-css' href='https:\/\/cyberrange.at\/wp-content\/uploads\/ac_assets\/image_reveal_on_scroll\/uc_image_reveal.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Image Reveal On Scroll *\/\n\n#uc_image_reveal_on_scroll_elementor_0823f4d .uc_overlay{\n  \tright: 0;\n}\n\n#uc_image_reveal_on_scroll_elementor_0823f4d .uc_reveal{\n\ttransition: ease-in-out all 0.5s;\n}\n\n#uc_image_reveal_on_scroll_elementor_0823f4d img\n{\n  display:block;\n}\n\n<\/style>\n\n<div class=\"uc_image_reveal\" id=\"uc_image_reveal_on_scroll_elementor_0823f4d\">\n\t<div class=\"uc_image_reveal_box\">\n      \t          \n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-6837-e1669368525888.jpg\" alt=\"\" width=\"100%\"  src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-6837-e1669368525888.jpg\" alt=\"\u00a9 Katharina Schiffl\" width=\"1800\" height=\"931\">\n          \n              \n\t\t<div class=\"uc_overlay iv-jello\"><\/div>\n        \n\t<\/div>\n<\/div>\n<!-- end Image Reveal On Scroll -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c444fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c444fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eba8b5e\" data-id=\"eba8b5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b24364 elementor-widget elementor-widget-html\" data-id=\"6b24364\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f2719c elementor-widget elementor-widget-heading\" data-id=\"6f2719c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Die KS\u00d6 Cybersicherheits\u00fcbungen 2017 und 2021<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cf5bf94 elementor-section-full_width elementor-inner-section-15 elementor-section-height-default elementor-section-height-default\" data-id=\"cf5bf94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-dda61b8\" data-id=\"dda61b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a79c248 elementor-widget elementor-widget-text-editor\" data-id=\"a79c248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bei zwei Gelegenheiten war das AIT der technische Durchf\u00fchrungspartner f\u00fcr eine nationale Cybersicherheits\u00fcbung, die vom Kompetenzzentrum Sicheres \u00d6sterreich (KS\u00d6) organisiert wurde. Diese technischen \u00dcbungen nutzten die AIT Cyber Range und zielten darauf ab, die Zusammenarbeit zwischen Betreibern kritischer Infrastrukturen und nationalen Beh\u00f6rden in \u00d6sterreich, wie dem nationalen CERT und den verschiedenen Ministerien, die Verpflichtungen in Bezug auf die nationale Cybersicherheit haben, zu unterst\u00fctzen. Das 2017 durchgef\u00fchrte Szenario bezog sich auf Cyber-Angriffe auf ein elektrisches Energieverteilungssystem, w\u00e4hrend sich das Szenario 2021 auf den pharmazeutischen Sektor (im Zusammenhang mit der Covid-19-Pandemie) konzentrierte. In beiden F\u00e4llen wurden repr\u00e4sentative Systeme entwickelt und auf der AIT Cyber Range eingesetzt, n\u00e4mlich die Infrastruktur eines Verteilernetzbetreibers (DSO) und ein K\u00fchlsystem f\u00fcr Impfstoffe.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6a8fecf\" data-id=\"6a8fecf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3172d80 elementor-widget elementor-widget-text-editor\" data-id=\"3172d80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die \u00dcbung wurde von acht Teams durchgef\u00fchrt, die die Rolle eines CSIRT-Teams in einer fiktiven Organisation spielten, mit Verpflichtungen sowohl gegen\u00fcber ihrer Organisation als auch gegen\u00fcber nationalen Beh\u00f6rden, wie z.B. der Allgemeinen Datenschutzverordnung (GDPR) und der Richtlinie f\u00fcr Netzwerk- und Informationssicherheit (NIS). An beiden Veranstaltungen nahmen bis zu 100 Personen teil. Dar\u00fcber hinaus wurde diese Schulung als erste l\u00e4nder\u00fcbergreifende Cybersicherheitssimulations\u00fcbung organisiert, bei der die Abwehr von Cyberangriffen in hybrider Form von Teilnehmern aus \u00d6sterreich, Deutschland und der Schweiz (DACH-Region) realistisch simuliert wurde.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4767f37\" data-id=\"4767f37\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-839e3b7 elementor-widget elementor-widget-image\" data-id=\"839e3b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"420\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/KSOE_2021_rgb.png\" class=\"attachment-large size-large wp-image-2659\" alt=\"\" srcset=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/KSOE_2021_rgb.png 1000w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/KSOE_2021_rgb-300x158.png 300w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/KSOE_2021_rgb-768x403.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-394f209 elementor-section-full_width elementor-inner-section-15 elementor-section-height-default elementor-section-height-default\" data-id=\"394f209\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7491e14\" data-id=\"7491e14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a51b464 elementor-widget elementor-widget-image\" data-id=\"a51b464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-7563-1536x1024.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-2661\" alt=\"\" srcset=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-7563-1536x1024.jpg 1536w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-7563-300x200.jpg 300w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-7563-1024x683.jpg 1024w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-7563-768x512.jpg 768w, https:\/\/cyberrange.at\/wp-content\/uploads\/2022\/11\/210921KatharinaSchiffl-7563.jpg 1800w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8f66398\" data-id=\"8f66398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Referenz-Projekte Regionaler IAEA-Schulungskurs \u00fcber Computersicherheit f\u00fcr Instrumentierungs- und Kontrollsysteme f\u00fcr kerntechnische Anlagen Im Rahmen der laufenden Zusammenarbeit zwischen der Internationalen Atomenergiebeh\u00f6rde (IAEA) und dem AIT als ernanntes IAEA-Kollaborationszentrum f\u00fcr Informations- und Computersicherheit f\u00fcr nukleare Sicherheit veranstaltet letzteres j\u00e4hrlich einen einw\u00f6chigen Schulungskurs in seinen Schulungsr\u00e4umen in Wien. Der Kurs konzentriert sich auf die Cybersicherheit industrieller Kontrollsysteme, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"rank_math_title":"Cyber Range Projekte: Erfolge & Referenzen in \u00d6sterreich","rank_math_description":"Cyber Range Projekte: Erfahren Sie mehr \u00fcber unsere erfolgreichen Cyber Security Projekte in \u00d6sterreich, inklusive IAEA-Schulungen und KS\u00d6-\u00dcbungen. Jetzt informieren!","rank_math_focus_keyword":"Cyber Range, Referenzprojekte, Cybersicherheit","rank_math_seo_score":"","footnotes":""},"class_list":["post-2655","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages\/2655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/comments?post=2655"}],"version-history":[{"count":8,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages\/2655\/revisions"}],"predecessor-version":[{"id":2743,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/pages\/2655\/revisions\/2743"}],"wp:attachment":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/media?parent=2655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}