{"id":22854,"date":"2025-04-23T08:10:57","date_gmt":"2025-04-23T06:10:57","guid":{"rendered":"c8e350eb-925a-42e6-92ad-69ea28dfc6c4"},"modified":"2025-04-23T13:31:21","modified_gmt":"2025-04-23T11:31:21","slug":"lagebericht-cybersecurity","status":"publish","type":"podcast","link":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/","title":{"rendered":"Lagebericht Cybersecurity"},"content":{"rendered":"\n\t<div class=\"col-md-7 col-lg-8 order-first\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col\">\n\t\t\t\t<div class=\"featured-episode featured_episode_single\">\n\t\t\t\t<div class=\"d-table w-100\">\n        \t\t<div class=\"d-table-cell\">\n                    <a href=\"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/\">\n                    \t\t\t\t\t\t\t\t\t\t\t\t\t    <h2 class=\"card-title text-left mb-0 pb-0 pl-0\"><a title=\"Lagebericht Cybersecurity\" href=\"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/\">Lagebericht Cybersecurity<\/a><\/h2>\n\t\t\t\t\t\t    \t\t\t\t\t\t     <h3 class=\"mt-0 mb-2 text-left\">Welche Attacken sind erfolgreich, wo sollten Firmen sich besser sch\u00fctzen?<\/h3>\n\t\t\t\t\t\t    \t\t\t\t\t\t\t<p class=\"podcast-interview-gast\">Andreas Rohr<\/p>\n                        \t\t\t\t\t                   \t<\/a>\n        \t\t<\/div>\n        \t\t<\/div>\n\t\t\t\t\n            <div class=\"podlove-web-player intrinsic-ignore podlove-web-player-loading\" id=\"player-69e0276acacb7\"><root data-test=\"player--m\" style=\"max-width:950px;min-width:260px;\">\n  <div class=\"p-4 flex flex-col\">\n    <div class=\"flex w-full items-center justify-center\">\n      <play-button class=\"block mr-5\" variant=\"simple\"><\/play-button>\n      <timer-current class=\"text-sm mr-5 hidden tablet:block\"><\/timer-current>\n      <progress-bar class=\"mr-5\"><\/progress-bar>\n      <timer-duration class=\"text-sm mr-5\"><\/timer-duration>\n      <volume-control class=\"flex items-center\"><\/volume-control>\n      <root class=\"p-4 flex justify-center\">\n  <speed-control><\/speed-control>\n<\/root>\n    <\/div>\n  <\/div>\n  <error><\/error>\n<\/root><\/div>\n            <script>\n              document.addEventListener(\"DOMContentLoaded\", function() {\n                var player = document.getElementById(\"player-69e0276acacb7\");\n                podlovePlayerCache.add([{\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/wp-json\\\/podlove-web-player\\\/shortcode\\\/publisher\\\/22854\",\"data\":{\"version\":5,\"show\":{\"title\":\"CIORadio\",\"subtitle\":\"In diesem Podcast liefern wir Ihnen als CIO regelm\\u00e4\\u00dfig alle Informationen zu den neuesten Trends im IT-Markt.\",\"summary\":\"Vielen IT-Verantwortlichen fehlt die Zeit, sich mit allen neuen Trends der IT ausreichend auseinander zu setzen.  Mit diesem Podcast wollen wir dieses Problem l\\u00f6sen. In kurzen Episoden werden wir die wichtigsten IT-Neuigkeiten und -Trends so aufbereiten, dass Sie als CIO daraus weitere Schritte f\\u00fcr Ihre IT-Organisation ableiten k\\u00f6nnen. Ob beim Autofahren, beim Joggen oder beim Check In am Flieger - wann Sie diese Informationen abrufen, entscheiden Sie selbst.\",\"poster\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Creative-Podcast-Cover-Trio.jpg\",\"link\":\"https:\\\/\\\/acent.de\\\/en\\\/cioradio\\\/\"},\"title\":\"Lagebericht Cybersecurity\",\"subtitle\":\"Welche Attacken sind erfolgreich, wo sollten Firmen sich besser sch\\u00fctzen?\",\"summary\":\"Geopolitische Spannungen versch\\u00e4rfen die Cybersicherheitslage. Abgesehen davon stehen Firmen vor allem bekannten Angriffsmaschen gegen\\u00fcber, beobachtet Andreas Rohr, Gesch\\u00e4ftsf\\u00fchrer der Deutschen Cyber-Sicherheitsorganisation (DCSO). Wenn Attacken erfolgreich sind, liege es meist nicht an falsch konfigurierten Systemen oder fehlenden Patches. Kritisch wird\\u2018s laut dem DCSO-Chef dort, wo das zentrale Management nicht greift: Wenn Mitarbeiter unbedarft auf Links in Mails klicken, Supply-Chain-Partner in der Produktion externe Ger\\u00e4te anst\\u00f6pseln oder niemand auf Alarmmeldungen reagiert. Was Firmen tun k\\u00f6nnen, um ihr Risiko zu verringern, dar\\u00fcber spricht Andreas Rohr im CIO-Radio.\",\"publicationDate\":\"2025-04-23T08:10:57+02:00\",\"duration\":\"00:24:31.679\",\"poster\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Creative-Podcast-Cover-Rohr.jpg\",\"link\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/\",\"chapters\":[],\"audio\":[{\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/podlove\\\/file\\\/1177\\\/s\\\/webplayer\\\/c\\\/website\\\/lagebericht-cybersecurity.m4a\",\"size\":\"24333746\",\"title\":\"MPEG-4 AAC Audio (m4a)\",\"mimeType\":\"audio\\\/mp4\"},{\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/podlove\\\/file\\\/1176\\\/s\\\/webplayer\\\/c\\\/website\\\/lagebericht-cybersecurity.mp3\",\"size\":\"23546867\",\"title\":\"MP3 Audio (mp3)\",\"mimeType\":\"audio\\\/mpeg\"}],\"files\":[{\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/podlove\\\/file\\\/1176\\\/s\\\/webplayer\\\/lagebericht-cybersecurity.mp3\",\"size\":\"23546867\",\"title\":\"MP3 Audio\",\"mimeType\":\"audio\\\/mpeg\"},{\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/podlove\\\/file\\\/1177\\\/s\\\/webplayer\\\/lagebericht-cybersecurity.m4a\",\"size\":\"24333746\",\"title\":\"M4A Audio\",\"mimeType\":\"audio\\\/mp4\"}],\"contributors\":[{\"id\":\"52\",\"name\":\"Andreas Rohr\",\"avatar\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/foto-weg-andreas-rohr.png\",\"role\":{\"id\":\"1\",\"slug\":\"gast\",\"title\":\"Gast\"},\"group\":null,\"comment\":null}]}}, {\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/wp-json\\\/podlove-web-player\\\/shortcode\\\/config\\\/acent\\\/theme\\\/acent\",\"data\":{\"activeTab\":null,\"subscribe-button\":null,\"share\":{\"channels\":[\"facebook\",\"twitter\",\"whats-app\",\"linkedin\",\"pinterest\",\"xing\",\"mail\",\"link\"],\"outlet\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/plugins\\\/podlove-web-player\\\/web-player\\\/share.html\",\"sharePlaytime\":true},\"related-episodes\":{\"source\":\"disabled\",\"value\":null},\"version\":5,\"theme\":{\"tokens\":{\"brand\":\"#E64415\",\"brandDark\":\"rgba(0, 0, 0, 1)\",\"brandDarkest\":\"#1A3A4A\",\"brandLightest\":\"rgba(255, 255, 255, 1)\",\"shadeDark\":\"#807E7C\",\"shadeBase\":\"#807E7C\",\"contrast\":\"#000\",\"alt\":\"#fff\"},\"fonts\":{\"ci\":{\"name\":\"ci\",\"family\":[\"-apple-system\",\"BlinkMacSystemFont\",\"Segoe UI\",\"Roboto\",\"Helvetica\",\"Arial\",\"sans-serif\",\"Apple Color Emoji\",\"Segoe UI Emoji\\\", \\\"Segoe UI Symbol\"],\"src\":[],\"weight\":800},\"regular\":{\"name\":\"regular\",\"family\":[\"-apple-system\",\"BlinkMacSystemFont\",\"Segoe UI\",\"Roboto\",\"Helvetica\",\"Arial\",\"sans-serif\",\"Apple Color Emoji\",\"Segoe UI Emoji\\\", \\\"Segoe UI Symbol\"],\"src\":[],\"weight\":300},\"bold\":{\"name\":\"bold\",\"family\":[\"-apple-system\",\"BlinkMacSystemFont\",\"Segoe UI\",\"Roboto\",\"Helvetica\",\"Arial\",\"sans-serif\",\"Apple Color Emoji\",\"Segoe UI Emoji\\\", \\\"Segoe UI Symbol\"],\"src\":[],\"weight\":700}}},\"base\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/plugins\\\/podlove-web-player\\\/web-player\\\/\"}}]);\n                podlovePlayer(player, \"https:\/\/acent.de\/en\/wp-json\/podlove-web-player\/shortcode\/publisher\/22854\", \"https:\/\/acent.de\/en\/wp-json\/podlove-web-player\/shortcode\/config\/acent\/theme\/acent\").then(function() {\n                  player && player.classList.remove(\"podlove-web-player-loading\");\n                });\n              });\n            <\/script>\n            <style>\n              .podlove-web-player.podlove-web-player-loading {\n                opacity: 0;\n              }\n            <\/style>\n        \n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"row mb-3\">\n\t\t\t<div class=\"col\">\n\t\t\t\t\t\t\t\t<ul class=\"episode_download_list\" style=\"margin-top: 20px; margin-left: 0px\">\n\t\t    \t    \t\t\t<li>\n\t\t\t\t<a href=\"https:\/\/acent.de\/en\/podlove\/file\/1176\/s\/download\/c\/buttonlist\/lagebericht-cybersecurity.mp3\" class=\"button btn-primary btn-red\"><i class=\"fa fa-download\" aria-hidden=\"true\"><\/i> MP3 Audio <span>22 MB<\/span><\/a>\n\t\t\t<\/li>\n\t    \t\t    \t    \t\t\t<li>\n\t\t\t\t<a href=\"https:\/\/acent.de\/en\/podlove\/file\/1177\/s\/download\/c\/buttonlist\/lagebericht-cybersecurity.m4a\" class=\"button btn-primary btn-red\"><i class=\"fa fa-download\" aria-hidden=\"true\"><\/i> M4A Audio <span>23 MB<\/span><\/a>\n\t\t\t<\/li>\n\t    \t<\/ul>\n<div style=\"clear: both\"><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<p>\n\t\t\tGeopolitische Spannungen versch\u00e4rfen die Cybersicherheitslage. Abgesehen davon stehen Firmen vor allem bekannten Angriffsmaschen gegen\u00fcber, beobachtet Andreas Rohr, Gesch\u00e4ftsf\u00fchrer der Deutschen Cyber-Sicherheitsorganisation (DCSO). Wenn Attacken erfolgreich sind, liege es meist nicht an falsch konfigurierten Systemen oder fehlenden Patches. Kritisch wird\u2018s laut dem DCSO-Chef dort, wo das zentrale Management nicht greift: Wenn Mitarbeiter unbedarft auf Links in Mails klicken, Supply-Chain-Partner in der Produktion externe Ger\u00e4te anst\u00f6pseln oder niemand auf Alarmmeldungen reagiert. Was Firmen tun k\u00f6nnen, um ihr Risiko zu verringern, dar\u00fcber spricht Andreas Rohr im CIO-Radio.\n\t\t<\/p>\n","protected":false},"author":19,"featured_media":22855,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[],"class_list":["post-22854","podcast","type-podcast","status-publish","has-post-thumbnail","hentry","themenkategorie-cyber-security","branchenkategorie-banken-versicherungen","branchenkategorie-energie-versorgung","branchenkategorie-handel-transport-logistik","branchenkategorie-industrie","branchenkategorie-pharma-gesundheit","branchenkategorie-private-equity","branchenkategorie-technologie-medien-telekommunikation","post"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ACENT AG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ACENT AG\" \/>\n<meta property=\"og:description\" content=\"Geopolitische Spannungen versch\u00e4rfen die Cybersicherheitslage. Abgesehen davon stehen Firmen vor allem bekannten Angriffsmaschen gegen\u00fcber, beobachtet Andreas Rohr, Gesch\u00e4ftsf\u00fchrer der Deutschen Cyber-Sicherheitsorganisation (DCSO). Wenn Attacken erfolgreich sind, liege es meist nicht an falsch konfigurierten Systemen oder fehlenden Patches. Kritisch wird\u2018s laut dem DCSO-Chef dort, wo das zentrale Management nicht greift: Wenn Mitarbeiter unbedarft auf Links in Mails klicken, Supply-Chain-Partner in der Produktion externe Ger\u00e4te anst\u00f6pseln oder niemand auf Alarmmeldungen reagiert. Was Firmen tun k\u00f6nnen, um ihr Risiko zu verringern, dar\u00fcber spricht Andreas Rohr im CIO-Radio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ACENT AG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T11:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acent.de\/wp-content\/uploads\/2025\/04\/Creative-Podcast-Cover-Rohr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/\",\"name\":\"ACENT AG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Creative-Podcast-Cover-Rohr.jpg\",\"datePublished\":\"2025-04-23T06:10:57+00:00\",\"dateModified\":\"2025-04-23T11:31:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Creative-Podcast-Cover-Rohr.jpg\",\"contentUrl\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Creative-Podcast-Cover-Rohr.jpg\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/lagebericht-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/acent.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Episodes\",\"item\":\"https:\\\/\\\/acent.de\\\/en\\\/podcast\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lagebericht Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/\",\"name\":\"ACENT AG\",\"description\":\"Wir beraten CIOs\",\"publisher\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acent.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#organization\",\"name\":\"ACENT AG\",\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/1507_Acent-Logo-neu_OK.jpg\",\"contentUrl\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/1507_Acent-Logo-neu_OK.jpg\",\"width\":354,\"height\":63,\"caption\":\"ACENT AG\"},\"image\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ACENT AG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"ACENT AG","og_description":"Geopolitische Spannungen versch\u00e4rfen die Cybersicherheitslage. Abgesehen davon stehen Firmen vor allem bekannten Angriffsmaschen gegen\u00fcber, beobachtet Andreas Rohr, Gesch\u00e4ftsf\u00fchrer der Deutschen Cyber-Sicherheitsorganisation (DCSO). Wenn Attacken erfolgreich sind, liege es meist nicht an falsch konfigurierten Systemen oder fehlenden Patches. Kritisch wird\u2018s laut dem DCSO-Chef dort, wo das zentrale Management nicht greift: Wenn Mitarbeiter unbedarft auf Links in Mails klicken, Supply-Chain-Partner in der Produktion externe Ger\u00e4te anst\u00f6pseln oder niemand auf Alarmmeldungen reagiert. Was Firmen tun k\u00f6nnen, um ihr Risiko zu verringern, dar\u00fcber spricht Andreas Rohr im CIO-Radio.","og_url":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/","og_site_name":"ACENT AG","article_modified_time":"2025-04-23T11:31:21+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/acent.de\/wp-content\/uploads\/2025\/04\/Creative-Podcast-Cover-Rohr.jpg","type":"image\/jpeg"}],"twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/","url":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/","name":"ACENT AG","isPartOf":{"@id":"https:\/\/acent.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/acent.de\/wp-content\/uploads\/2025\/04\/Creative-Podcast-Cover-Rohr.jpg","datePublished":"2025-04-23T06:10:57+00:00","dateModified":"2025-04-23T11:31:21+00:00","breadcrumb":{"@id":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acent.de\/en\/lagebericht-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/#primaryimage","url":"https:\/\/acent.de\/wp-content\/uploads\/2025\/04\/Creative-Podcast-Cover-Rohr.jpg","contentUrl":"https:\/\/acent.de\/wp-content\/uploads\/2025\/04\/Creative-Podcast-Cover-Rohr.jpg","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/acent.de\/en\/lagebericht-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/acent.de\/en\/"},{"@type":"ListItem","position":2,"name":"Episodes","item":"https:\/\/acent.de\/en\/podcast\/"},{"@type":"ListItem","position":3,"name":"Lagebericht Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/acent.de\/en\/#website","url":"https:\/\/acent.de\/en\/","name":"ACENT AG","description":"Wir beraten CIOs","publisher":{"@id":"https:\/\/acent.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acent.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/acent.de\/en\/#organization","name":"ACENT AG","url":"https:\/\/acent.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/acent.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/acent.de\/wp-content\/uploads\/2017\/05\/1507_Acent-Logo-neu_OK.jpg","contentUrl":"https:\/\/acent.de\/wp-content\/uploads\/2017\/05\/1507_Acent-Logo-neu_OK.jpg","width":354,"height":63,"caption":"ACENT AG"},"image":{"@id":"https:\/\/acent.de\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/episodes\/22854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/episodes"}],"about":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/types\/podcast"}],"author":[{"embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/comments?post=22854"}],"version-history":[{"count":3,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/episodes\/22854\/revisions"}],"predecessor-version":[{"id":22859,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/episodes\/22854\/revisions\/22859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/media\/22855"}],"wp:attachment":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/media?parent=22854"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/tags?post=22854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}