  [{"data":1,"prerenderedAt":405},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/security-adventures_de":194,"viewQuery_3523_DE":369},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"LÃ¶sungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Ãœber uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","ÂÌ²èÖ±²¥","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":367,"background_color":368,"teaser_title":202,"teaser_subtitle":218,"teaser_text":367},"DetailPage","9370a393-7089-4b2e-99bf-df71c8c96ede",507,"Security Adventures","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/security-adventures",{"__typename":206,"language_id":210,"url":211},"DE","/de/security-adventures",{"__typename":206,"language_id":213,"url":214},"IT","/it/security-adventures",{"__typename":206,"language_id":216,"url":217},"FR","/fr/security-adventures",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":211,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Erzielen Sie nachhaltiges Engagement durch praxisnahe Security-Erlebnisse: Â«Hack The HackerÂ» im Escape Room, Â«Track The HackerÂ» in der Outdoor-Quest, Â«Security ArcadeÂ» an unseren Puzzle-Stationen oder retten Sie Ihr Â«Piece of CakeÂ» in unserem Tabletop-Rollenspiel.","Security Adventures | ÂÌ²èÖ±²¥",[224,298,308],{"__typename":225,"_id":226,"paragraph_id":227,"title":218,"items":228},"ImageTextList","47304414-287c-40e9-9ea2-e1a7ab73b138",3517,[229,252,266,282],{"__typename":230,"id":231,"_id":232,"title":233,"text":234,"cta":235,"cta_style":239,"image":240},"ImageTextItem",3516,"c4a851ee-b751-4f0b-b659-a1c2f7cb7a5e"," Hack The Hacker","\u003Cp>Ein Klick auf einen Link in einer E-Mail hat das Computersystem Ihrer Organisation mit Ransomware infiziert. Nun liegt es an Ihnen und Ihren Kolleginnen und Kollegen, die Daten zu sichern und den Angriff der Hacker zu stoppen.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Cp>Bauen Sie Wissen auf. Stellen Sie sich der Bedrohung. Hacken Sie den Hacker.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Cp>Dieses Spiel vermittelt ein fundiertes VerstÃ¤ndnis fÃ¼r die Bedeutung starker PasswÃ¶rter und deren sichere Aufbewahrung.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Cp>\u003Cem>\u003Cstrong>6 Personen. 2 Stunden. 1 Mission.\u003C/strong>\u003C/em>\u003C/p>",{"__typename":236,"url":237,"title":238,"target":218},"Link","/de/node/310","Â«Hack The HackerÂ» - der Escape Room","primary",{"__typename":241,"src":242,"sources":243,"width":248,"height":249,"alt":250,"type":251,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/unbenannt.png?itok=Miebhavi",[244],{"__typename":245,"src":246,"media":218,"sizes":247},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/unbenannt.png?itok=Miebhavi 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/unbenannt.png?itok=UMU4gsA1 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/unbenannt.png?itok=Dyej9jW7 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/unbenannt.png?itok=CTrIJHYF 1230w","(min-width: 984px) 51vw, 95vw",908,506,"Hack The Hacker","image/png",{"__typename":230,"id":253,"_id":254,"title":255,"text":256,"cta":257,"cta_style":239,"image":260},3518,"e75fbf5f-0b9c-4186-a0f6-2707e9a45996","Security Arcade","\u003Cp>Cyberspace befindet sich im Ausnahmezustand, seit der Megakonzern VisuCorp sÃ¤mtliche Tiervideos aus dem Internet entfernt hat â€“ mit Verweis auf angebliche ProduktivitÃ¤tsverluste. Inakzeptabel. Es bleibt nur eine Option: Betreten Sie die Security Arcade.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Cp>Sammeln Sie Informationen. Hacken Sie VisuCorp. Retten Sie die Katzenvideos.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Cp>Die Teilnehmenden erleben auf spielerische und praxisnahe Weise, wie Cyberangriffe funktionieren.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Cp>\u003Cem>\u003Cstrong>2 Personen. 30 Minuten. 5 Herausforderungen.\u003C/strong>\u003C/em>\u003C/p>",{"__typename":236,"url":258,"title":259,"target":218},"/de/security-arcade-die-raetselstationen","Â«Security ArcadeÂ» â€“ die RÃ¤tselstationen",{"__typename":241,"src":261,"sources":262,"width":248,"height":265,"alt":255,"type":251,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/arcade.png?itok=NY7ET-cp",[263],{"__typename":245,"src":264,"media":218,"sizes":247},"https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/arcade.png?itok=NY7ET-cp 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/arcade.png?itok=JsPaN5zY 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/arcade.png?itok=q6tzrP44 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/arcade.png?itok=dF0qr657 1230w",728,{"__typename":230,"id":267,"_id":268,"title":269,"text":270,"cta":271,"cta_style":239,"image":274},3519,"421646bb-13ea-4428-aa12-6394271543a8","Piece of Cake","\u003Cp>Oh nein! Das geheime Rezept fÃ¼r Ihren berÃ¼hmten Kuchen wurde gestohlen. Ohne dieses Rezept ist Ihre BÃ¤ckerei dem Untergang geweiht.\u003C/p>\u003Cp>\u003Cbr>Nur Ihr grÃ¶sster Rivale kann hinter dieser bÃ¶swilligen Tat stecken. KÃ¶nnen Sie das Rezept rechtzeitig zurÃ¼ckholen?\u003Cbr>Sammeln Sie Informationen. Schleichen Sie sich ein. Und sichern Sie sich Ihr StÃ¼ck vom Kuchen.\u003C/p>\u003Cp>\u003Cbr>Die Teilnehmenden werden fÃ¼r die Bedeutung von Datenschutz und Informationssicherheit sensibilisiert und lernen die Risiken von Social-Engineering-Methoden kennen.\u003C/p>\u003Cp>\u003Cbr>\u003Cem>\u003Cstrong>5 Personen. 2 Stunden. 1 Mission.\u003C/strong>\u003C/em>\u003C/p>",{"__typename":236,"url":272,"title":273,"target":218},"/de/piece-cake","Â«Piece of CakeÂ» â€“ das Rollenspiel",{"__typename":241,"src":275,"sources":276,"width":279,"height":280,"alt":269,"type":281,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-04/piece-of-cake.jpg?itok=WX7G-6_m",[277],{"__typename":245,"src":278,"media":218,"sizes":247},"https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-04/piece-of-cake.jpg?itok=WX7G-6_m 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-04/piece-of-cake.jpg?itok=RUbN32zo 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-04/piece-of-cake.jpg?itok=G8s89-UC 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-04/piece-of-cake.jpg?itok=cssIarvN 1230w",3567,2480,"image/jpeg",{"__typename":230,"id":283,"_id":284,"title":285,"text":286,"cta":287,"cta_style":239,"image":290},3520,"8beb6a32-7362-48d7-8ea2-929337491679","Track The Hacker","\u003Cp>Sicherheitsalarm! Ein krimineller Hacker ist unbemerkt in Ihre RÃ¤umlichkeiten eingedrungen und hat kritische Daten Ihrer Organisation gestohlen. Nun ist er auf der Flucht und versucht, diese zu verkaufen. KÃ¶nnen Sie seine digitalen Spuren verfolgen und ihn aufspÃ¼ren?\u003C/p>\u003Cp>\u003Cbr>Bauen Sie Wissen auf. Verfolgen Sie die Daten. Finden Sie den Hacker.\u003C/p>\u003Cp>\u003Cbr>Das Spiel verdeutlicht die Bedeutung des Schutzes personenbezogener und sensibler Informationen vor unbefugtem Zugriff oder Offenlegung.\u003C/p>\u003Cp>\u003Cbr>\u003Cem>\u003Cstrong>6 Personen. 2â€“3 Stunden. 1 Mission.\u003C/strong>\u003C/em>\u003C/p>",{"__typename":236,"url":288,"title":289,"target":218},"/de/track-hacker","Â«Track The HackerÂ» - der Outdoor-Quest",{"__typename":241,"src":291,"sources":292,"width":295,"height":296,"alt":297,"type":281,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=z-GEx8Io",[293],{"__typename":245,"src":294,"media":218,"sizes":247},"https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=z-GEx8Io 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=-fztLET3 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=V383pLsx 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=EcHWhmO3 1230w",1500,900,"hucs track the hacker",{"__typename":299,"_id":300,"paragraph_id":301,"title":302,"contact_boxes":303},"ContactBoxList","e504c2ea-faa4-4cdb-819a-0fc324f09492",3522,"Noch Fragen?",[304],{"__typename":305,"name":306,"image":218,"phone_number":218,"e_mail_address":307,"job_title":218,"organisation":218},"ContactBox","Human Centred Security Team","hucs@switch.ch",{"__typename":309,"_id":310,"paragraph_id":311,"title":52,"langcode":210,"preseselected_field_event_type_target_id":312,"preseselected_field_topics_target_id":313,"next_events":314,"events_overview_page":357},"NextEvents","f9e97998-6310-4a1e-9a79-5a5b439403e2",3523,[],[],{"__typename":315,"display_id":316,"view_id":317,"available_exposed_filters":318,"available_contextual_filters":351,"pager":352},"View","next_events","events_overview",[319,341],{"__typename":320,"field_name":321,"filter_label":322,"options":323},"ViewsExposedFilter","field_topics_target_id","Kompetenzbereich",[324,327,330,332,334,336,338],{"__typename":325,"id":326,"label":17},"ViewsExposedFilterOptions","9",{"__typename":325,"id":328,"label":329},"10","Cloud Services & Video",{"__typename":325,"id":331,"label":114},"13",{"__typename":325,"id":333,"label":32},"11",{"__typename":325,"id":335,"label":37},"15",{"__typename":325,"id":337,"label":42},"12",{"__typename":325,"id":339,"label":340},"16","eduhub",{"__typename":320,"field_name":342,"filter_label":343,"options":344},"field_event_type_target_id","Art des Events",[345,348],{"__typename":325,"id":346,"label":347},"23","Community Event",{"__typename":325,"id":349,"label":350},"24","Ã–ffentlicher Event","langcode,excluded_nid",{"__typename":353,"pager_type":354,"total_pages":355,"items_per_page":356},"ViewsPager","full",2,3,{"__typename":358,"alternates":359},"LandingPage",[360,362,363,365],{"__typename":206,"language_id":207,"url":361},"/en/events",{"__typename":206,"language_id":210,"url":54},{"__typename":206,"language_id":213,"url":364},"/it/node/215",{"__typename":206,"language_id":216,"url":366},"/fr/events","Erzielen Sie nachhaltiges Engagement durch praxisnahe Security-Erlebnisse: Â«Hack The HackerÂ» im Escape Room, Â«Track The HackerÂ» in der Outdoor-Quest, Â«Security ArcadeÂ» an unseren Puzzle-Stationen oder retten Sie Ihr Â«Piece of CakeÂ» in unserem Tabletop-Rollenspiel.\r\n","blue-purple",{"data":370,"loading":186,"networkStatus":187},{"view":371},{"__typename":315,"view_id":317,"field_settings":218,"result_count":372,"pager":373,"result":374},5,{"__typename":353,"items_per_page":356,"pager_type":354,"total_pages":355},[375,386,396],{"__typename":376,"nid":377,"title":378,"teaser_text":379,"url":380,"teaser_title":378,"infos_date":381,"infos_location":385,"teaser_subtitle":218},"EventDetailPage",504,"Forum Day Juni 2026","Begleiten Sie uns zu einem spannenden ÂÌ²èÖ±²¥-Event, das unsere Gemeinschaften fÃ¼r einen Tag voller Begegnung, Zusammenarbeit und Inspiration zusammenbringt.\r\nDie Forum Days bieten eine einzigartige Plattform, auf der sich verschiedene Gruppen treffen, Informationen austauschen, an dynamischen Diskussionen teilnehmen und inspirierenden PrÃ¤sentationen lauschen kÃ¶nnen.\r\n\r\nDie Forum Days sind eine geschlossene Community-Veranstaltung!","/de/forum-day-juni-2026",{"__typename":382,"date_range":383,"time_range":384},"DateRangeItem","18. Juni 2026","9:30â€“17:30","UniversitÃ¤t Bern, HauptgebÃ¤ude, Hochschulstrasse 4, 3012 Bern",{"__typename":376,"nid":387,"title":388,"teaser_text":389,"url":390,"teaser_title":391,"infos_date":392,"infos_location":395,"teaser_subtitle":218},500,"Forum Days Cloud Forward","Nach dem Erfolg der Ausgabe 2025 wird die zweite Forum Days Cloud Forward im Juni 2026 Expert:innen und EntscheidungstrÃ¤ger zusammenbringen, um sich Ã¼ber Cloud-Themen auszutauschen.\r\nWÃ¤hrend OCRE und GÃ‰ANT weiterhin eine zentrale Rolle spielen, wird die Veranstaltung 2026 ihren Fokus erweitern und Keynotes, Fallstudien, Anbieterperspektiven sowie Networking-MÃ¶glichkeiten bieten.","/de/forum-days-cloud-forward-0","Ignite your Cloud Journey",{"__typename":382,"date_range":393,"time_range":394},"23. Juni 2026","9:00â€“18:00","Eventforum Bern, Fabrikstrasse 12, 3012 Bern",{"__typename":376,"nid":397,"title":398,"teaser_text":399,"url":400,"teaser_title":398,"infos_date":401,"infos_location":404,"teaser_subtitle":218},503,"Human Centred Security Day 2026","Am Human Centred Security Day von ÂÌ²èÖ±²¥ werfen wir einen praxisnahen Blick auf aktuelle Herausforderungen der Cybersicherheit.\r\n\r\nIm Fokus steht, sicheres Verhalten im Alltag zu erleichtern, ergÃ¤nzt durch Einblicke in Human Risk, KI-bezogene Bedrohungen und Sicherheitskultur sowie Austausch mit Fachpersonen.","/de/human-centred-security-day-2026",{"__typename":382,"date_range":402,"time_range":403},"22. Okt. 2026","8:30â€“17:30","Zentrum Paul Klee, Monument im Fruchtland 3, 3006 Bern",1776426949247]