{"id":1466,"date":"2021-02-07T00:26:08","date_gmt":"2021-02-07T00:26:08","guid":{"rendered":"http:\/\/hkm-consulting.de\/lectures\/"},"modified":"2025-09-30T20:55:01","modified_gmt":"2025-09-30T20:55:01","slug":"lectures_events","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/lectures_events\/","title":{"rendered":"Lectures &#038; Events"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Upcoming lectures &amp; events<\/h3>\n<p>[\/vc_column_text][vc_separator][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3><strong>MMMMMMM, DDth YYYY<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Lectures &amp; Event<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1759239063982{margin-bottom: 16px !important;}&#8221;]<strong>Preventing Data Leaks \u2013 How to Prevent the Transfer of Data from an Organisation to Unauthorised Third Parties<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Hall West \u2013 Cyber Security Stage \u2013 Saarlandhalle Saarbr\u00fccken, Germany[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1759239281988{margin-bottom: 16px !important;}&#8221;]<strong>Organizer:<\/strong> <a href=\"https:\/\/it-con-messe.de\/die-messe\/programm\" target=\"_blank\" rel=\"noopener\">saaris \u2013 saarland innovation und standort GmbH\u00a0\/ Congress-Centrum Saar GmbH<\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Media and Press:<\/strong> <a href=\"https:\/\/www.linkedin.com\/posts\/klausmartinhecht_itcon2025-cybr360-cybersecurity-activity-7378390657507221504-6ntj?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAADfpnEBaP9C52aCUrWi9y97HQpX2OwGyp4\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> &#8211; <a href=\"https:\/\/www.instagram.com\/p\/DOvUSQ7iGtm\/\" target=\"_blank\" rel=\"noopener\">Instagram<\/a> &#8211; <a href=\"https:\/\/www.wirtschaftsregion-saarbruecken.de\/event\/it-con-2025\/\" target=\"_blank\" rel=\"noopener\">Press<\/a> &#8211; Impressions[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3><strong>September, 18th 2025<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>IT.CON by CYBR360<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1759239063982{margin-bottom: 16px !important;}&#8221;]<strong>Preventing Data Leaks \u2013 How to Prevent the Transfer of Data from an Organisation to Unauthorised Third Parties<\/strong>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Hall West \u2013 Cyber Security Stage \u2013 Saarlandhalle Saarbr\u00fccken, Germany[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1759239281988{margin-bottom: 16px !important;}&#8221;]<strong>Organizer:<\/strong> <a href=\"https:\/\/it-con-messe.de\/die-messe\/programm\" target=\"_blank\" rel=\"noopener\">saaris \u2013 saarland innovation und standort GmbH\u00a0\/ Congress-Centrum Saar GmbH<\/a>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<strong>Media and Press:<\/strong> <a href=\"https:\/\/www.linkedin.com\/posts\/klausmartinhecht_itcon2025-cybr360-cybersecurity-activity-7378390657507221504-6ntj?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAADfpnEBaP9C52aCUrWi9y97HQpX2OwGyp4\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> &#8211; <a href=\"https:\/\/www.instagram.com\/p\/DOvUSQ7iGtm\/\" target=\"_blank\" rel=\"noopener\">Instagram<\/a> &#8211; <a href=\"https:\/\/www.wirtschaftsregion-saarbruecken.de\/event\/it-con-2025\/\" target=\"_blank\" rel=\"noopener\">Press<\/a> &#8211; Impressions[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Archive<\/h3>\n<p>A small selection of lectures on each of the new, significant technologies and innovations.[\/vc_column_text][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3><strong>May, 21st 2025<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Guest Lecture at Munich University of Applied Sciences<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]A practice-oriented guest lecture aimed at passing on practical experience in data protection and information security to the next generation of promising young professionals.[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Munich University of Applied Sciences, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3><strong>July, 31st 2024<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Entrepreneurship with responsibility: Acting successfully and socially<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Lecture and panel discussion[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Leipzig Industry Forum 2024, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>March, 23rd 2023<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>KRITIS &#8211; Are you prepaired ?<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Cyber Secure Forum 2023[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Lecture &amp; workshop on securing critical infrastructure[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>November, 17th\/18th 2022<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Compliance and Reality<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Lecture, workshop &amp; online seminar on compliance requirements 2022[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Innovation Day 2022 &#8211; Frankfurt am Main &amp; Mannheim, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3>June, 10th 2020<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>In the footsteps of James Bond 007 &#8211; How can we protect our data ?<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Rotary 100 Munich[\/vc_column_text][vc_column_text]Online guest lecture for a virtual club meeting[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>November 12th\/13th 2019<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Espionage &#8211; Protect the crown jewels of your company!<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]protect 2019<br \/>\nConference on the protection of critical infrastructures<br \/>\nLeipzig[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Leipzig Trade Center, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3>May, 14th\/15th 2019<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>When the crown jewels disappear &#8211; In the footsteps of 007<\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Verband f\u00fcr Sicherheitstechnik e.V. &#8211; 25th anniversary congress<br \/>\nSafety on the right track<br \/>\nPeople \u2013\u00a0Organization \u2013 Technology[\/vc_column_text][vc_column_text]Congress Hotel Potsdam at Templiner See, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>Oktober, 16th 2018<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>Management of Information Security Attributes &#8211;<br \/>\nConfidentiality, Integrity and Availability<\/strong><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p>DirectLink Innovation Day<\/p>\n<p>[\/vc_column_text][vc_column_text]Munich, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>Oktober, 26th 2015<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>Cybersecurity and Data Leakage Prevention<br \/>\nCurrent methods, threads and potentials for entrepreneurs<\/strong><\/h3>\n<p>[\/vc_column_text][vc_column_text]TUM M\u00fcnchen<br \/>\nTUM Speakers Series<br \/>\nLeaders and shapers[\/vc_column_text][vc_column_text]Munich, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>April, 29<\/strong>th<strong> 2014<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>IP Protection with Data Leakage Prevention<br \/>\nServices for a State-of-the-Art Security Operation Center<\/h3>\n<p>[\/vc_column_text][vc_column_text]infosecurity Europe<br \/>\nGlobal Security Report 2014[\/vc_column_text][vc_column_text]London, United Kingdom[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>April, 17<\/strong>th\/18th\/19th<strong> 2012<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Data Leakage Prevention Today<br \/>\nIntegrate DLP in a comprehensive Security Operation Center<\/h3>\n<p>[\/vc_column_text][vc_column_text]IBM Switzerland<br \/>\nSecurity Roadshow 2012[\/vc_column_text][vc_column_text]Zurich, Geneva and Lausanne, Switzerland[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>May, 17<\/strong>th<strong> 2011<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Cloud Computing<br \/>\nSaaS, PaaS, IaaS &#8211; The Big Picture for Data Security<\/h3>\n<p>[\/vc_column_text][vc_column_text]Symantec<br \/>\nSecurity Forum Germany 2011[\/vc_column_text][vc_column_text]Frankfurt am Main, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>March, 19<\/strong>th<strong> 2010<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Security Report 2009\/2010<br \/>\nCybercrime &amp; Cybersecurity<\/h3>\n<p>[\/vc_column_text][vc_column_text]etis Community Gathering<br \/>\nSecurity Report Summit 2010[\/vc_column_text][vc_column_text]Copenhagen, Denmark[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>September, <\/strong>24th<strong> 2009<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Security Report 2008\/2009<br \/>\nCybercrime &amp; Cybersecurity<\/h3>\n<p>[\/vc_column_text][vc_column_text]etis Community Gathering<br \/>\nSecurity Report Summit 2009[\/vc_column_text][vc_column_text]Istanbul, Turkey[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>January, <\/strong>28th<strong> 2009<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Executive Dinner &#8211; Munich<br \/>\nEnterprise Information Protection<\/h3>\n<p>[\/vc_column_text][vc_column_text]Verdasys<br \/>\nExecutive Management Circle for New Technologies[\/vc_column_text][vc_column_text]Munich, Germany[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>November, <\/strong>19th\/20th<strong>\u00a02008<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Comprehensive data protection<br \/>\nInteraction of technology and organization<\/h3>\n<p>[\/vc_column_text][vc_column_text]T-Systems P.R. China Ltd.<br \/>\nInnovation Days 2008<br \/>\nGlobal New Technologies[\/vc_column_text][vc_column_text]Bejing and Shanghai, Peoples Republik of China[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>January, 30th 2008<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>How to adapt DLP for EMEA<br \/>\nGlobal challenges for Data Leakage Prevention<\/h3>\n<p>[\/vc_column_text][vc_column_text]Websense Inc.<br \/>\nKick-Off Summit 2008[\/vc_column_text][vc_column_text]San Diego, California &#8211; United States of America[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>November, 6th 2007<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Data Loss Prevention Summit &#8211; London<br \/>\nProtection of Intellectual Property<\/h3>\n<p>[\/vc_column_text][vc_column_text]Websense UK Ltd.<br \/>\nNew Technology Summit[\/vc_column_text][vc_column_text]Reading &#8211; London, United Kingdom[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<h3><strong>July, 27th 2003<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Data is the new currency<br \/>\nThe global values have already changed<\/h3>\n<p>[\/vc_column_text][vc_column_text]T-Systems P.R. China Ltd.<br \/>\nInnovation Day 2003<br \/>\nGlobal New Technologies[\/vc_column_text][vc_column_text]Bejing, Peoples Republik of China[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Upcoming lectures &amp; events [\/vc_column_text][vc_separator][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;&#8221;] MMMMMMM, DDth YYYY [\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text css=&#8221;&#8221;] Lectures &amp; Event [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1759239063982{margin-bottom: 16px !important;}&#8221;]Preventing Data Leaks \u2013 How to Prevent the Transfer of Data from an Organisation to Unauthorised Third Parties[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Hall West \u2013 Cyber Security Stage \u2013 Saarlandhalle Saarbr\u00fccken, Germany[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1759239281988{margin-bottom: 16px !important;}&#8221;]Organizer: saaris \u2013&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1466","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=1466"}],"version-history":[{"count":69,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1466\/revisions"}],"predecessor-version":[{"id":4275,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1466\/revisions\/4275"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=1466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}