{"id":3321,"date":"2024-04-16T09:49:54","date_gmt":"2024-04-16T07:49:54","guid":{"rendered":"https:\/\/www.cyberagentur.de\/focal-points\/"},"modified":"2026-01-29T21:51:08","modified_gmt":"2026-01-29T20:51:08","slug":"focal-points","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/focal-points\/","title":{"rendered":"Focal points"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle\">Clustered into four focus areas, we have identified 14 cyber security topics within which we identify, fund and evaluate research projects. The basis for this is our innovation and knowledge management, which identifies groundbreaking technological potential many years in advance by focusing on weak signals, thus providing the input for our focal points and subject areas and scientifically substantiating their relevance.<\/p>\n<div class=\"ce-focusmenu ce-focusmenu--2columns has-background has-purple-misty-background-color align is-style-with-space wp-block-cyberagentur-focusmenu has-background has-purple-misty-background-color\">\n    <ul class=\"ce-panelmenu\">\n        <li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/schwerpunkte\/sichere-gesellschaft\/\" aria-label=\"go to  Secure society\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/01\/CA-Icon-Schwerpunkt-SiGe.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Secure society<\/h3>\n      <p>So that we are safe in the digital world of the day after tomorrow.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/schwerpunkte\/schluesseltechnologien\/\" aria-label=\"go to  Key technologies\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/01\/CA-Icon-Schwerpunkt-SchTech.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Key technologies<\/h3>\n      <p>The impact is coming. Let&#8217;s make use of it. <\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/schwerpunkte\/cybersicherheit-komplexer-systeme\/\" aria-label=\"go to  Cybersecurity of complex systems\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/01\/CA-Icon-Schwerpunkt-SiSy.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Cybersecurity of complex systems<\/h3>\n      <p>New security paradigms for complex digital orders.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/schwerpunkte\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" aria-label=\"go to  Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/01\/CA-Icon-Schwerpunkt-VerTechWK-DD.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Vertrauensw\u00fcrdige Technische Wertsch\u00f6pfungsketten<\/h3>\n      <p>So that citizens in Germany can have confidence in digital solutions.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li>\n    <\/ul>\n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce--dark-mode ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default align wp-block-cyberagentur-frame\">\n        <div class=\"ce-frame__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2512\" height=\"1599\" src=\"\/wp-content\/uploads\/2024\/07\/mesh_9.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/07\/mesh_9.jpg 2512w, \/wp-content\/uploads\/2024\/07\/mesh_9-330x210.jpg 330w, \/wp-content\/uploads\/2024\/07\/mesh_9-1024x652.jpg 1024w, \/wp-content\/uploads\/2024\/07\/mesh_9-768x489.jpg 768w, \/wp-content\/uploads\/2024\/07\/mesh_9-1536x978.jpg 1536w, \/wp-content\/uploads\/2024\/07\/mesh_9-2048x1304.jpg 2048w, \/wp-content\/uploads\/2024\/07\/mesh_9-512x326.jpg 512w\" sizes=\"auto, (max-width: 2512px) 100vw, 2512px\" \/>\n    <\/div>\n    <div class=\"ce-frame__content\">\n                <p class=\"is-style-topline topline-position-left\">Innovation management<\/p>\n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Input for our 4 focal points and 14 topic areas.<\/h2>\n\n\n<div class='ce-spacer'><\/div>\n\n\n<p class=\"has-text-align-left is-style-shrink-default\">What could be state of the art in cyber security in ten to 15 years&#8217; time? Our innovation and knowledge management finds answers \u2013 by focusing on weak signals.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/innovationsmanagement\/\">Learn more<\/a><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align hide-on-print wp-block-cyberagentur-frame has-background has-white-background-color\" id=\"newsletter\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Newsletter<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"is-style-subtitle\"><strong>Your update on research, awarding and co.<\/strong><\/p>\n\n\n\n<p>Subscribe to our scientific newsletter. In this way, you can find out promptly which research projects we are currently awarding, when partnering events, symposia or ideas competitions are coming up and what&#8217;s new in research.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"ce-scwrapper align align wp-block-cyberagentur-shortcodewrapper\">\n  \n\t\t\t<form id=\"sib_signup_form_2\" method=\"post\" class=\"sib_signup_form\">\n\t\t\t\t<div class=\"sib_loader\" style=\"display:none;\"><img\n\t\t\t\t\t\t\tsrc=\"https:\/\/www.cyberagentur.de\/wp-includes\/images\/spinner.gif\" alt=\"loader\"><\/div>\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_action\" value=\"subscribe_form_submit\">\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_id\" value=\"2\">\n                <input type=\"hidden\" name=\"sib_form_alert_notice\" value=\"Please fill out this field\">\n                <input type=\"hidden\" name=\"sib_form_invalid_email_notice\" value=\"Your email address is invalid\">\n                <input type=\"hidden\" name=\"sib_security\" value=\"349a0d7abc\">\n\t\t\t\t<div class=\"sib_signup_box_inside_2\">\n\t\t\t\t\t<div style=\"\/*display:none*\/\" class=\"sib_msg_disp\">\n\t\t\t\t\t<\/div>\n                    \t\t\t\t\t<div class=\"ce-newsletter-form\">\r\n    <p class=\"sib-email-area\">\r\n        <label>\r\n            <span>E-mail address*<\/span>\r\n            <input type=\"email\" class=\"sib-email-area\" placeholder=\"E-mail address*\" name=\"email\" required=\"required\">\r\n        <\/label>\r\n    <\/p>\r\n    <p class=\"sib-FIRSTNAME-area\">\r\n        <label>\r\n            <span>First name<\/span>\r\n            <input type=\"text\" class=\"sib-FIRSTNAME-area\" placeholder=\"First name\" name=\"FIRSTNAME\">\r\n        <\/label>\r\n    <\/p>\r\n    <p class=\"sib-LASTNAME-area\">\r\n        <label>\r\n            <span>Surname<\/span>\r\n            <input type=\"text\" class=\"sib-NAME-area\" placeholder=\"Surname\" name=\"LASTNAME\">\r\n        <\/label>\r\n    <\/p>\r\n    <div class=\"form-radio-wrapper\">\r\n        <input type=\"checkbox\" name=\"terms\" required=\"required\" id=\"newsletter-terms\">\r\n        <label for=\"newsletter-terms\">\r\n            <span class=\"label-text\">I agree to the terms and conditions set out in the <a href=\"https:\/\/www.cyberagentur.de\/en\/privacy-policy\/\">privacy policy<\/a>\r\n                are. (Required field)<\/span>\r\n        <\/label>\r\n    <\/div>\r\n    <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex\">\r\n        <div class=\"wp-block-button\">\r\n            <button type=\"submit\" class=\"sib-default-btn wp-block-button__link wp-element-button\">Subscribe to our newsletter<\/button>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t<\/form>\n\t\t\t<style>\n\t\t\t\tform#sib_signup_form_2 p.sib-alert-message {\n    padding: 6px 12px;\n    margin-bottom: 20px;\n    border: 1px solid transparent;\n    border-radius: 4px;\n    -webkit-box-sizing: border-box;\n    -moz-box-sizing: border-box;\n    box-sizing: border-box;\n}\nform#sib_signup_form_2 p.sib-alert-message-error {\n    background-color: #f2dede;\n    border-color: #ebccd1;\n    color: #a94442;\n}\nform#sib_signup_form_2 p.sib-alert-message-success {\n    background-color: #dff0d8;\n    border-color: #d6e9c6;\n    color: #3c763d;\n}\nform#sib_signup_form_2 p.sib-alert-message-warning {\n    background-color: #fcf8e3;\n    border-color: #faebcc;\n    color: #8a6d3b;\n}\n\t\t\t<\/style>\n\t\t\t\n<\/div><\/div>\n<\/div>\n\n<\/div>\n    <\/div>\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p>Clustered into four focus areas, we have identified 14 cyber security topics within which we identify, fund and evaluate research projects. The basis for this is our innovation and knowledge management, which identifies groundbreaking technological potential many years in advance by focusing on weak signals, thus providing the input for our focal points and subject [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3321","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Focal points - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Focal points - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Clustered into four focus areas, we have identified 14 cyber security topics within which we identify, fund and evaluate research projects. The basis for this is our innovation and knowledge management, which identifies groundbreaking technological potential many years in advance by focusing on weak signals, thus providing the input for our focal points and subject [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T20:51:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\",\"name\":\"Focal points - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-04-16T07:49:54+00:00\",\"dateModified\":\"2026-01-29T20:51:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focal points\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Focal points - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/focal-points\/","og_locale":"en_GB","og_type":"article","og_title":"Focal points - Cyberagentur","og_description":"Clustered into four focus areas, we have identified 14 cyber security topics within which we identify, fund and evaluate research projects. The basis for this is our innovation and knowledge management, which identifies groundbreaking technological potential many years in advance by focusing on weak signals, thus providing the input for our focal points and subject [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/","og_site_name":"Cyberagentur","article_modified_time":"2026-01-29T20:51:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/","url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/","name":"Focal points - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-04-16T07:49:54+00:00","dateModified":"2026-01-29T20:51:08+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/focal-points\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Focal points"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=3321"}],"version-history":[{"count":10,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321\/revisions"}],"predecessor-version":[{"id":6274,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321\/revisions\/6274"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}