{"id":2830,"date":"2023-11-06T14:58:00","date_gmt":"2023-11-06T13:58:00","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/"},"modified":"2024-08-12T12:10:56","modified_gmt":"2024-08-12T10:10:56","slug":"competition-promotes-innovative-research-approaches","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/","title":{"rendered":"Competition promotes innovative research approaches"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Cyberagentur evaluates with a high level of expertise<\/strong><\/h2>\n  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie-1024x683.png\" class=\"attachment-large size-large\" alt=\"Dr. Harald Niggemann, Cyber Security Strategist beim Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) Oberstleutnant und Christoph K\u00fchn, Dezernatsleiter im im Zentrum f\u00fcr Cyber-Sicherheit der Bundeswehr.\" srcset=\"\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie-1024x683.png 1024w, \/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie-330x220.png 330w, \/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie-768x512.png 768w, \/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie-512x341.png 512w, \/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Dr. Harald Niggemann, Cyber Security Strategist beim Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) Oberstleutnant und Christoph K\u00fchn, Dezernatsleiter im im Zentrum f\u00fcr Cyber-Sicherheit der Bundeswehr.<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>At the end of last year, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) launched an important research project with the competition &#8220;Existential risks from cyber and information space &#8211; high security in security-critical and defense-relevant scenarios&#8221; (HSK).\nA multi-million euro contract for the cyber security of critical infrastructure, which entered its second phase in September with three research consortia. <\/strong><\/p>\n\n<p>The Cyberagentur has formed an expert jury to evaluate the concepts submitted in the first phase of the competition.\nIt is made up of researchers from the Cyberagentur and two external experts.\nThe external members are Dr. Harald Niggemann, Cyber Security Strategist at the Federal Office for Information Security (BSI) and Lieutenant Colonel Christoph K\u00fchn, Head of Department at the Bundeswehr Cyber Security Center.\nIn an interview with the Cyberagentur, both spoke about the competition, the challenges and the prospects.   <\/p>\n\n<p><strong>Question: How were you selected for jury duty and what is your impression after a year of jury duty?<\/strong><\/p>\n\n<p><em>Dr. Harald Niggemann<\/em>: The HSK competition deals with a range of topics from all three pillars of cyber security: prevention, detection and response.\nFor the BSI, it was therefore clear from the outset that a broad background of experience in various facets was necessary for this jury activity.\nAs I have been working on strategic aspects and the fundamentals of operational cyber security at the BSI for many years and have also been able to gain jury experience in other projects, I was naturally very happy to take on this task.\nThe first year on the jury was an excellent opportunity for me to take a close look at new research approaches, not only on the basis of the concepts submitted, but also in discussions with the other jury members.   <\/p>\n\n<p><em>Christoph K\u00fchn: <\/em>In July 2022, potential jury members were sought for this project.\nAs I am interested in science and research and the project is similar to my current role, I applied.\nMy department at the Bundeswehr Center for Cyber Security (ZCSBw) deals with cyber threats, hazards and risks.\nThe ZCSBw as a whole protects the Bundeswehr&#8217;s information and information technology in various aspects.   <\/p>\n\n<p>My superiors supported the commitment, even though we were all aware that additional work and effort would be required.\nEverything seemed to fit and I was selected. <\/p>\n\n<p>The work is fun, although a lot of time has to be invested.\nEspecially in the phases in which documents have to be evaluated, I can&#8217;t avoid reading and commenting on them in my free time.\nSitting in the office for hours on end over several days in order to concentrate on reading is simply not possible as head of department in an operational area.  <\/p>\n\n<p>The Cyberagentur team integrates us two externals very well and you can tell that our opinion is valued.\nThat&#8217;s why I&#8217;m happy to spend the time. <\/p>\n\n<p><strong>Question: What do you see as the significance of the current competition?\nWhat do you hope to gain from the competition? <\/strong><\/p>\n\n<p><em>Dr. Harald Niggemann<\/em>: Cyber attacks are constantly evolving, both technologically and in terms of the methods used.\nThey affect all areas of society, especially critical infrastructures, i.e. services that are particularly important for supplying the population.\nWithout innovative approaches based on scientific findings, we will not be able to adequately counter these threats in the future.\nTo do this, we need the entire chain from basic research to the development of marketable products.\nThe HSK competition is an important contribution to this, as it enables the commissioning of outstanding research projects that leave the beaten track.    <\/p>\n\n<p><em>Christoph K\u00fchn: <\/em>The Cyberagentur promotes high-risk research with this project.\nI don&#8217;t believe that companies and start-ups in particular, but also universities that rely on third-party funding, would be able to conduct such intensive research into these topics without the Cyberagentur&#8217;s project funding.\nThis is precisely why the Cyberagentur was founded: to ensure Germany&#8217;s sovereignty in cyber security and its key technologies.  <\/p>\n\n<p>We will not be able to use the research results immediately.\nBut when we look at the duration of armaments projects, it becomes clear that we have to look far into the future in order to make them safe from the design stage.\nEven if the Bundeswehr is not defined as critical infrastructure, the operational capability of the Bundeswehr is essential for Germany.  <\/p>\n\n<p><strong>Question: What are the issues facing the future cyber security of critical infrastructure?<\/strong><\/p>\n\n<p><em>Christoph K\u00fchn: <\/em>Our world is characterized by complexity and networking.\nThis inevitably leads to systems offering attack surfaces that cannot always be adequately protected with today&#8217;s resources and available specialist personnel.\nThis is why we need processes and tools that help us to prevent, detect and respond to attacks in cyber and information space (CIR).\nOf course, artificial intelligence always plays an important role here.\nAfter all, we have to assume that attackers also use these methods.\nI really like the fact that all the remaining consortia are not just looking at individual aspects, but have chosen a holistic approach.     <\/p>\n\n<p><em>Dr. Harald Niggemann<\/em>: I would like to highlight two aspects that I believe are particularly important.\nThe first is the need for automation.\nCyber attacks often affect many systems at the same time and often require very rapid action to limit the potential damage.\nManual intervention is becoming less and less practicable for this.\nThe second aspect is security throughout the supply chain.\nIn recent years, the main focus has been on secure operations for users of information technology.\nHowever, we will only be able to guarantee adequate cyber security if we take this into account from the outset when developing components and supplier components.      <\/p>\n\n<p><strong>Question: You both work in a more operational role.\nWhat impression have you gained from the academic side and are there any insights (of a technical or procedural nature) that you can apply to your work? <\/strong><\/p>\n\n<p><em>Dr. Harald Niggemann<\/em>: The BSI&#8217;s working methods and services, including in the area of operational cyber security, are based on scientific findings.\nThe continuous exchange with university and non-university research institutions is therefore an essential foundation of our work.\nIn my view, the particular added value of the HSK competition lies in the risk.\nIn this competition, the Cyberagentur expects applicants to be willing to look for new solutions outside of the familiar approaches, even if this makes the course of the project less predictable.\nI have already been able to learn numerous ideas from the evaluated concepts and the main results are still to come.    <\/p>\n\n<p><em>Christoph K\u00fchn: <\/em>I was wonderfully received and my opinion is valued, even though I&#8217;m the only one on the jury without a doctorate (laughs).\nThe mix of academic and operational staff on the jury makes it possible to evaluate projects in a differentiated way.\nEven though I work in operations, my position as head of department means that I often have to record documents and content, identify focal points and key messages, evaluate them and draw conclusions.\nThis is not far removed from academic work.   <\/p>\n\n<p>It was interesting for me to see the different approaches of the competitors and their view of the overall problem.\nThis opened up new connections for me that I probably wouldn&#8217;t have seen otherwise.\nI have already benefited from this in other working groups, but also in my day-to-day work.  <\/p>\n\n<p>Groups often develop their own jargon over the years.\nThis is even proverbial for the Bundeswehr and its abbreviations.\nHere, too, I had to get used to understanding other people&#8217;s technical terms and holding back with my own.\nThis is another soft skill that I was able to improve.   <\/p>\n\n<p><strong>How do your organizations benefit from your work as a jury member?<\/strong><\/p>\n\n<p><em>Dr. Harald Niggemann<\/em>: On the one hand, jury membership is another opportunity for the BSI to contribute its experience in prevention, detection and mitigation to the research landscape.\nThis applies, for example, to the practical work of the National IT Situation Center and the Computer Emergency Response Team Bund (CERT-Bund), both of which are based at the BSI.\nHowever, the reverse flow of information is just as important to the BSI.\nAs already mentioned, cyber security is dependent on new impetus from research and science.   <\/p>\n\n<p><em>Christoph K\u00fchn: <\/em>Unfortunately, there are currently no staff with extensive military experience working permanently at the Cyberagentur.\nWith me as part of the external jury team, existing expertise will be expanded to include the military defense perspective and the project groups applying will be asked to think about this as well. <\/p>\n\n<p>In particular, I have found that direct discussions at workshops on site or in longer web conferences improve collaboration and mutual understanding.\nIn professional dialog or in side conversations, you suddenly come across things that would not have been discussed in a written comment or email.\nThis also brings up topics that are relevant to other projects or clarify the general military view.\nThat&#8217;s why I think the cost of being present on site is more than justified.   <\/p>\n\n<p><strong>What advice would you give to future jury members?<\/strong><strong><\/strong><\/p>\n\n<p><em>Christoph K\u00fchn: <\/em>Look forward to the work and the experience and enter the academic world in a relaxed and relaxed manner.\nBut this is not a task that can be completed in just a few short meetings.\nSo far, I have invested over 20 working days and the project will run for another three years.\nIt&#8217;s certainly worth the effort, but you have to be able to find the time in your own schedule and task portfolio.   <\/p>\n\n<p><em>Dr. Harald Niggemann<\/em>: As a jury member, I have set myself the aim of drawing on my experience in the field of cyber security when evaluating the submissions, of course, but also being prepared to question the established solutions.\nIn order to arrive at the most objective assessments possible, I must be able to engage with new approaches, provided they are well-founded, plausible and promising. <\/p>\n\n<p><strong>Further information:<\/strong> <a href=\"https:\/\/www.cyberagentur.de\/hsk\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cyberagentur.de\/hsk\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberagentur evaluates with a high level of expertise At the end of last year, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) launched an important research project with the competition &#8220;Existential risks from cyber and information space &#8211; high security in security-critical and defense-relevant scenarios&#8221; (HSK). A multi-million euro contract for the cyber security [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":2828,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[54],"tags":[],"class_list":["post-2830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Competition promotes innovative research approaches - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Competition promotes innovative research approaches - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Cyberagentur evaluates with a high level of expertise At the end of last year, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) launched an important research project with the competition &#8220;Existential risks from cyber and information space &#8211; high security in security-critical and defense-relevant scenarios&#8221; (HSK). A multi-million euro contract for the cyber security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-06T13:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T10:10:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"Competition promotes innovative research approaches\",\"datePublished\":\"2023-11-06T13:58:00+00:00\",\"dateModified\":\"2024-08-12T10:10:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/\"},\"wordCount\":1676,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Externe-Experten-HSK-Jury-Kopie.png\",\"articleSection\":[\"Secure systems\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/\",\"name\":\"Competition promotes innovative research approaches - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Externe-Experten-HSK-Jury-Kopie.png\",\"datePublished\":\"2023-11-06T13:58:00+00:00\",\"dateModified\":\"2024-08-12T10:10:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Externe-Experten-HSK-Jury-Kopie.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Externe-Experten-HSK-Jury-Kopie.png\",\"width\":1500,\"height\":1000,\"caption\":\"Dr. Harald Niggemann, Cyber Security Strategist beim Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) Oberstleutnant und Christoph K\u00fchn, Dezernatsleiter im im Zentrum f\u00fcr Cyber-Sicherheit der Bundeswehr.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/competition-promotes-innovative-research-approaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Competition promotes innovative research approaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Competition promotes innovative research approaches - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/","og_locale":"en_GB","og_type":"article","og_title":"Competition promotes innovative research approaches - Cyberagentur","og_description":"Cyberagentur evaluates with a high level of expertise At the end of last year, the Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) launched an important research project with the competition &#8220;Existential risks from cyber and information space &#8211; high security in security-critical and defense-relevant scenarios&#8221; (HSK). A multi-million euro contract for the cyber security [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/","og_site_name":"Cyberagentur","article_published_time":"2023-11-06T13:58:00+00:00","article_modified_time":"2024-08-12T10:10:56+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"Competition promotes innovative research approaches","datePublished":"2023-11-06T13:58:00+00:00","dateModified":"2024-08-12T10:10:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/"},"wordCount":1676,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png","articleSection":["Secure systems"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/","name":"Competition promotes innovative research approaches - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png","datePublished":"2023-11-06T13:58:00+00:00","dateModified":"2024-08-12T10:10:56+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png","contentUrl":"\/wp-content\/uploads\/2024\/08\/Externe-Experten-HSK-Jury-Kopie.png","width":1500,"height":1000,"caption":"Dr. Harald Niggemann, Cyber Security Strategist beim Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) Oberstleutnant und Christoph K\u00fchn, Dezernatsleiter im im Zentrum f\u00fcr Cyber-Sicherheit der Bundeswehr."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/competition-promotes-innovative-research-approaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Competition promotes innovative research approaches"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/2830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=2830"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/2830\/revisions"}],"predecessor-version":[{"id":2831,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/2830\/revisions\/2831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2828"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=2830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=2830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=2830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}