{"id":12551,"date":"2025-10-09T12:57:54","date_gmt":"2025-10-09T10:57:54","guid":{"rendered":"https:\/\/acstyria.com\/?p=12551"},"modified":"2025-10-27T14:49:03","modified_gmt":"2025-10-27T13:49:03","slug":"businessfruehstueck-ki-digitalisierung-cybersicherheit","status":"publish","type":"post","link":"https:\/\/acstyria.com\/en\/2025\/10\/09\/businessfruehstueck-ki-digitalisierung-cybersicherheit\/","title":{"rendered":"BUSINESSFR\u00dcHST\u00dcCK | KI, Digitalisierung &amp; Cybersicherheit"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"12551\" class=\"elementor elementor-12551\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e1a45c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e1a45c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4dec689c\" data-id=\"4dec689c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca4b6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ca4b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p data-start=\"63\" data-end=\"311\">Das Businessfr\u00fchst\u00fcck widmete sich zwei zentralen Themen der digitalen Transformation: <strong data-start=\"150\" data-end=\"167\">Cybersecurity<\/strong> and <strong data-start=\"172\" data-end=\"198\">K\u00fcnstliche Intelligenz<\/strong>. Nach einem gemeinsamen Start ab 08:30 Uhr beleuchteten zwei Impulse aktuelle Entwicklungen und Anforderungen.<\/p>\n<p data-start=\"313\" data-end=\"572\">Der erste Impuls thematisierte Chancen und Risiken von <strong data-start=\"509\" data-end=\"527\">KI-Anwendungen<\/strong> sowie den europ\u00e4ischen Regulierungsrahmen.&nbsp;<span style=\"letter-spacing: 0px;\">Der zweite Beitrag behandelte die<\/span><span style=\"letter-spacing: 0px;\">&nbsp;<\/span><strong data-start=\"346\" data-end=\"366\" style=\"letter-spacing: 0px;\">NIS-2-Richtlinie<\/strong><span style=\"letter-spacing: 0px;\">&nbsp;<\/span><span style=\"letter-spacing: 0px;\">mit Fokus auf Pflichten f\u00fcr Unternehmen, Haftungsfragen und erste Umsetzungsschritte.<\/span><\/p>\n<p><\/p>\n<p data-start=\"574\" data-end=\"776\" data-is-last-node=\"\" data-is-only-node=\"\">In der abschlie\u00dfenden Diskussion standen <strong data-start=\"615\" data-end=\"659\">Governance, Verantwortung und Compliance<\/strong> als verbindende Elemente im Mittelpunkt. Der Vormittag endete mit einem offenen Austausch bei Kaffee und Networking.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Herzlichen Dank unseren Vortragenden der <a href=\"https:\/\/acg-consultants.at\/\">ACG Consultants GmbH<\/a> f\u00fcr den spannenden&nbsp;Vormittag.<\/p>\n<p><\/p>\n<p><\/p>\n<hr>\n<p><\/p>\n<p><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ac25c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ac25c3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44cc7bc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44cc7bc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0420ac8\" data-id=\"0420ac8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12a20a3 elementor-widget elementor-widget-image\" data-id=\"12a20a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"473\" src=\"https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-1024x473.jpg\" class=\"attachment-large size-large wp-image-12555\" alt=\"\" srcset=\"https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-1024x473.jpg 1024w, https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-300x139.jpg 300w, https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-768x355.jpg 768w, https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-1536x710.jpg 1536w, https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-2048x946.jpg 2048w, https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-18x8.jpg 18w, https:\/\/acstyria.com\/wp-content\/uploads\/20250917_091135-1-600x277.jpg 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Das Businessfr\u00fchst\u00fcck widmete sich zwei zentralen Themen der digitalen Transformation: Cybersecurity und K\u00fcnstliche Intelligenz. Nach einem gemeinsamen Start ab 08:30 Uhr beleuchteten zwei Impulse aktuelle Entwicklungen und Anforderungen. Der erste Impuls thematisierte Chancen und Risiken von KI-Anwendungen sowie den europ\u00e4ischen Regulierungsrahmen.&nbsp;Der zweite Beitrag behandelte die&nbsp;NIS-2-Richtlinie&nbsp;mit Fokus auf Pflichten f\u00fcr Unternehmen, Haftungsfragen und erste Umsetzungsschritte. In [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,6],"tags":[],"class_list":["post-12551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-website"],"_links":{"self":[{"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/posts\/12551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/comments?post=12551"}],"version-history":[{"count":10,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/posts\/12551\/revisions"}],"predecessor-version":[{"id":12566,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/posts\/12551\/revisions\/12566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/media\/11897"}],"wp:attachment":[{"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/media?parent=12551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/categories?post=12551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acstyria.com\/en\/wp-json\/wp\/v2\/tags?post=12551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}