{"id":181,"date":"2024-04-16T09:51:25","date_gmt":"2024-04-16T07:51:25","guid":{"rendered":"https:\/\/cyber.ddev.site\/wp\/focal-points\/innovation-and-knowledge-management\/"},"modified":"2026-01-29T12:11:25","modified_gmt":"2026-01-29T11:11:25","slug":"innovationsmanagement","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/","title":{"rendered":"Innovation management"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle\">What could be top class in cyber security in ten to 15 years&#8217; time? What does the future hold for cyber security and the associated key technologies? What threats will exist in cyberspace in ten to 15 years&#8217; time and how must internal and external security players be positioned in order to effectively counter these threats? Our innovation management team finds the answers: qualitative and quantitative trend analyses are used to identify trends and scenario and foresight analyses are used to open up future possibilities. The findings are incorporated as impulses into our three focus areas and their subject areas, within which we commission research projects. They are also made available to the Federal Republic of Germany and its stakeholders.    <\/p>\n\n<h2 class=\"wp-block-heading has-text-align-center is-style-subtitle\"><strong>But how does innovation management work?<\/strong><\/h2>\n<div class='ce-spacer'><\/div><div class=\"ce-coloredpanel align is-layout-constrained ce-coloredpanel--ratio-2_3 wp-block-cyberagentur-coloredpanel ce--dark-mode\">\n  <div  class=\"ce-coloredpanel__wrapper has-background has-purple-background-color align wp-block-cyberagentur-coloredpanel has-background has-purple-background-color\">\n      <div class=\"ce-coloredpanel__header\">\n        <h2 class=\"ce-coloredpanel__headline is-style-subheadline-small\">Scanning and networking: interdisciplinarity as a mode of knowledge<\/h2>\n        \n      <\/div>\n      <div class=\"ce-coloredpanel__content\">\n        <div class=\"acf-innerblocks-container\">\n\n<p>The Cyberagentur&#8217;s innovation and knowledge management team is made up of experts from a wide range of disciplines. This heterogeneous composition is not merely an expression of lived diversity, but constitutes the methodological core of the work: the interdisciplinary view. It is precisely the diversity of perspectives that makes it possible to identify technological, social and political developments from a variety of angles at an early stage and to evaluate them in context. The team continuously analyzes relevant sources to systematically develop future potential: These include scientific databases, structured data sets, press publications and specialist and industry reports. The aim is to recognize early signals of technological or social transformations and translate them into an analytical discourse.    <\/p>\n\n\n\n<p>A central prerequisite for understanding innovation processes is the direct exchange with those involved in their development. The team is therefore involved in conferences, specialist events and dialog formats with start-ups, companies and research institutions in order to pick up new ideas and observe trends as they emerge. If you want to understand where innovation originates, you have to work at the interfaces between politics, science, business and society.  <\/p>\n\n<\/div>\n      <\/div>\n  <\/div>\n<\/div><div class=\"ce-coloredpanel align is-layout-constrained ce-coloredpanel--ratio-2_3 wp-block-cyberagentur-coloredpanel ce--dark-mode\">\n  <div  class=\"ce-coloredpanel__wrapper has-background has-purple-background-color align wp-block-cyberagentur-coloredpanel has-background has-purple-background-color\">\n      <div class=\"ce-coloredpanel__header\">\n        <h2 class=\"ce-coloredpanel__headline is-style-subheadline-small\">Cyberagentur Landscapes: Strategic trend mapping<\/h2>\n        \n      <\/div>\n      <div class=\"ce-coloredpanel__content\">\n        <div class=\"acf-innerblocks-container\">\n\n<p>As part of the so-called Cyberagentur Landscapes, the team regularly creates thematic and country-specific trend profiles. The central questions of these analyses are: Which disruptive technologies will become relevant to security in the next ten to fifteen years? And which countries, companies or research institutions are already driving their development today?  <\/p>\n\n<\/div>\n      <\/div>\n  <\/div>\n<\/div><div class=\"ce-coloredpanel align is-layout-constrained ce-coloredpanel--ratio-2_3 wp-block-cyberagentur-coloredpanel ce--dark-mode\">\n  <div  class=\"ce-coloredpanel__wrapper has-background has-purple-background-color align wp-block-cyberagentur-coloredpanel has-background has-purple-background-color\">\n      <div class=\"ce-coloredpanel__header\">\n        <h2 class=\"ce-coloredpanel__headline is-style-subheadline-small\">Text mining: Identification of trends in scientific publications<\/h2>\n        \n      <\/div>\n      <div class=\"ce-coloredpanel__content\">\n        <div class=\"acf-innerblocks-container\">\n\n<p>Another key instrument for the early detection of technological developments is the automated analysis of scientific publications using text mining. Here, global publication activity is used as an early indicator of technological movements. Although the future cannot be measured empirically, it is possible to deduce which technological paradigms are emerging from present-day research.  <\/p>\n\n<\/div>\n      <\/div>\n  <\/div>\n<\/div><div class=\"ce-coloredpanel align is-layout-constrained ce-coloredpanel--ratio-2_3 wp-block-cyberagentur-coloredpanel ce--dark-mode\">\n  <div  class=\"ce-coloredpanel__wrapper has-background has-purple-background-color align wp-block-cyberagentur-coloredpanel has-background has-purple-background-color\">\n      <div class=\"ce-coloredpanel__header\">\n        <h2 class=\"ce-coloredpanel__headline is-style-subheadline-small\">Scenario and foresight analyses: foresight as a strategic compass<\/h2>\n        \n      <\/div>\n      <div class=\"ce-coloredpanel__content\">\n        <div class=\"acf-innerblocks-container\">\n\n<p>The findings from the trend analyses form the basis for structured future considerations in the form of scenario and foresight analyses. The aim of this methodology is not to predict, but to systematically explore possible futures in the field of cyber security. Social, technological, political, economic and ecological developments are translated into coherent scenarios that provide orientation for decision-makers.  <\/p>\n\n<\/div>\n      <\/div>\n  <\/div>\n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-right ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-misty-background-color align is-style-default wp-block-cyberagentur-frame has-background has-purple-misty-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__background\">\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/Fragezeichen_space_white.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\n    <\/div>    \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Questions about our innovation <br\/>and knowledge management?<\/h2>\n\n\n\n<p>Send us an e-mail: <br\/><a href=\"mailto:i&#110;n&#111;&#118;a&#116;&#105;on&#115;ma&#110;&#97;gem&#101;&#110;t&#64;cybe&#114;&#97;&#103;&#101;ntu&#114;&#46;d&#101;\">i&#110;n&#111;&#118;atio&#110;s&#109;&#97;na&#103;&#101;&#109;&#101;n&#116;&#64;cyb&#101;r&#97;&#103;entu&#114;.&#100;e<\/a><\/p>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left is-style-subtitle is-style-subheadline\">Also interesting<\/h2>\n\n\n<div class=\"ce-focusmenu ce-focusmenu--2columns has-background has-white-background-color align wp-block-cyberagentur-focusmenu has-background has-white-background-color\">\n    <ul class=\"ce-panelmenu\">\n        <li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/\" aria-label=\"go to  Secure society\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Gesellschaft.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Secure society<\/h3>\n      <p>So that we are safe in the digital world of the day after tomorrow.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\" aria-label=\"go to  Key technologies\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Schluesseltechnologien-2.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Key technologies<\/h3>\n      <p>The impact is coming. Let&#8217;s make use of it. <\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/\" aria-label=\"go to  Cybersecurity of complex systems\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Systeme.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Cybersecurity of complex systems<\/h3>\n      <p>New security paradigms for complex digital orders.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" aria-label=\"go to  Trustworthy technical value chains\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/04\/CA_Icon_VerTechWK_final.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Trustworthy technical value chains<\/h3>\n      <p>So that citizens in Germany can have confidence in digital solutions.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li>\n    <\/ul>\n<\/div>\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-less-pale-background-color align hide-on-print wp-block-cyberagentur-frame has-background has-purple-less-pale-background-color\" id=\"newsletter\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Newsletter<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"is-style-subtitle\"><strong>Your update on research, awarding and co.<\/strong><\/p>\n\n\n\n<p>Subscribe to our scientific newsletter.\nThis will keep you up to date on which research projects we are currently awarding, when partnering events, symposia or ideas competitions are coming up and what&#8217;s new in research. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-scwrapper align align wp-block-cyberagentur-shortcodewrapper\">\n  \n\t\t\t<form id=\"sib_signup_form_2\" method=\"post\" class=\"sib_signup_form\">\n\t\t\t\t<div class=\"sib_loader\" style=\"display:none;\"><img\n\t\t\t\t\t\t\tsrc=\"https:\/\/www.cyberagentur.de\/wp-includes\/images\/spinner.gif\" alt=\"loader\"><\/div>\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_action\" value=\"subscribe_form_submit\">\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_id\" value=\"2\">\n                <input type=\"hidden\" name=\"sib_form_alert_notice\" value=\"Please fill out this field\">\n                <input type=\"hidden\" name=\"sib_form_invalid_email_notice\" value=\"Your email address is invalid\">\n                <input type=\"hidden\" name=\"sib_security\" value=\"fed98e2103\">\n\t\t\t\t<div class=\"sib_signup_box_inside_2\">\n\t\t\t\t\t<div style=\"\/*display:none*\/\" class=\"sib_msg_disp\">\n\t\t\t\t\t<\/div>\n                    \t\t\t\t\t<div class=\"ce-newsletter-form\">\r\n    <p class=\"sib-email-area\">\r\n        <label>\r\n            <span>E-mail address*<\/span>\r\n            <input type=\"email\" class=\"sib-email-area\" placeholder=\"E-mail address*\" name=\"email\" required=\"required\">\r\n        <\/label>\r\n    <\/p>\r\n    <p class=\"sib-FIRSTNAME-area\">\r\n        <label>\r\n            <span>First name<\/span>\r\n            <input type=\"text\" class=\"sib-FIRSTNAME-area\" placeholder=\"First name\" name=\"FIRSTNAME\">\r\n        <\/label>\r\n    <\/p>\r\n    <p class=\"sib-LASTNAME-area\">\r\n        <label>\r\n            <span>Surname<\/span>\r\n            <input type=\"text\" class=\"sib-NAME-area\" placeholder=\"Surname\" name=\"LASTNAME\">\r\n        <\/label>\r\n    <\/p>\r\n    <div class=\"form-radio-wrapper\">\r\n        <input type=\"checkbox\" name=\"terms\" required=\"required\" id=\"newsletter-terms\">\r\n        <label for=\"newsletter-terms\">\r\n            <span class=\"label-text\">I agree to the terms and conditions set out in the <a href=\"https:\/\/www.cyberagentur.de\/en\/privacy-policy\/\">privacy policy<\/a>\r\n                are. (Required field)<\/span>\r\n        <\/label>\r\n    <\/div>\r\n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex\">\r\n        <div class=\"wp-block-button\">\r\n            <button type=\"submit\" class=\"sib-default-btn wp-block-button__link wp-element-button\">Subscribe to our newsletter<\/button>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t<\/form>\n\t\t\t<style>\n\t\t\t\tform#sib_signup_form_2 p.sib-alert-message {\n    padding: 6px 12px;\n    margin-bottom: 20px;\n    border: 1px solid transparent;\n    border-radius: 4px;\n    -webkit-box-sizing: border-box;\n    -moz-box-sizing: border-box;\n    box-sizing: border-box;\n}\nform#sib_signup_form_2 p.sib-alert-message-error {\n    background-color: #f2dede;\n    border-color: #ebccd1;\n    color: #a94442;\n}\nform#sib_signup_form_2 p.sib-alert-message-success {\n    background-color: #dff0d8;\n    border-color: #d6e9c6;\n    color: #3c763d;\n}\nform#sib_signup_form_2 p.sib-alert-message-warning {\n    background-color: #fcf8e3;\n    border-color: #faebcc;\n    color: #8a6d3b;\n}\n\t\t\t<\/style>\n\t\t\t\n<\/div><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p>What could be top class in cyber security in ten to 15 years&#8217; time? What does the future hold for cyber security and the associated key technologies? What threats will exist in cyberspace in ten to 15 years&#8217; time and how must internal and external security players be positioned in order to effectively counter these [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3321,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-181","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Innovation management - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Innovation management - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"What could be top class in cyber security in ten to 15 years&#8217; time? What does the future hold for cyber security and the associated key technologies? What threats will exist in cyberspace in ten to 15 years&#8217; time and how must internal and external security players be positioned in order to effectively counter these [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T11:11:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/innovationsmanagement\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/innovationsmanagement\\\/\",\"name\":\"Innovation management - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-04-16T07:51:25+00:00\",\"dateModified\":\"2026-01-29T11:11:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/innovationsmanagement\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/innovationsmanagement\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/innovationsmanagement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focal points\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Innovation management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Innovation management - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/","og_locale":"en_GB","og_type":"article","og_title":"Innovation management - Cyberagentur","og_description":"What could be top class in cyber security in ten to 15 years&#8217; time? What does the future hold for cyber security and the associated key technologies? What threats will exist in cyberspace in ten to 15 years&#8217; time and how must internal and external security players be positioned in order to effectively counter these [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/","og_site_name":"Cyberagentur","article_modified_time":"2026-01-29T11:11:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/","url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/","name":"Innovation management - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-04-16T07:51:25+00:00","dateModified":"2026-01-29T11:11:25+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Focal points","item":"https:\/\/www.cyberagentur.de\/en\/focal-points\/"},{"@type":"ListItem","position":3,"name":"Innovation management"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=181"}],"version-history":[{"count":12,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/181\/revisions"}],"predecessor-version":[{"id":6217,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/181\/revisions\/6217"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}