  [{"data":1,"prerenderedAt":344},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/security-engagement-kit_de":194},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"LÃ¶sungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Ãœber uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","ÂÌ²èÖ±²¥","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":221,"background_color":343,"teaser_title":202,"teaser_subtitle":218,"teaser_text":221},"DetailPage","42034182-756a-4340-8353-d195380ffcab",506,"Security Engagement Kit","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/security-engagement-kit",{"__typename":206,"language_id":210,"url":211},"DE","/de/security-engagement-kit",{"__typename":206,"language_id":213,"url":214},"IT","/it/security-engagement-kit",{"__typename":206,"language_id":216,"url":217},"FR","/fr/security-engagement-kit",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":211,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Mitarbeitende fÃ¼r Sicherheit sensibilisieren und aktiv einbinden? Das Security Engagement Kit ist genau dafÃ¼r konzipiert. Wissenschaftlich fundiert. Anpassbar. Begleitet durch Expertinnen und Experten von der ersten Analyse bis zur regelmÃ¤ssigen Evaluation.","Security Engagement Kit | ÂÌ²èÖ±²¥",[224,229,263,286,291],{"__typename":225,"_id":226,"paragraph_id":227,"title":218,"text":228},"TextItem","f80695f0-ad86-4c4b-ac6a-f903c391c35a",3498,"\u003Cp>Das \u003Cstrong>Security Engagement Kit\u003C/strong> ist ein massgeschneidertes, sofort einsetzbares und wissenschaftlich fundiertes Programm, das KomplexitÃ¤t reduziert und nachhaltige VerhaltensÃ¤nderungen fÃ¶rdert. Es fokussiert auf zentrale Verhaltensweisen und vermittelt Mitarbeitenden die notwendigen Kompetenzen, also Wissen und FÃ¤higkeiten, die passenden Rahmenbedingungen wie Tools und Prozesse sowie die Motivation, diese im Arbeitsalltag und im privaten Umfeld anzuwenden. Dadurch werden Menschen befÃ¤higt, sich aktiv mit digitaler Sicherheit auseinanderzusetzen.\u003C/p>\u003Cp>Im Unterschied zu isolierten E-Learning Plattformen oder umfangreichen Beratungsprojekten verbindet das Security Engagement Kit die Einfachheit von E-Learning Angeboten mit der Wirksamkeit von mehrkanaligen Kommunikationsmassnahmen. Es bietet ein wirkungsvolles und planbares Leistungsportfolio, das es Verantwortlichen im Bereich Sicherheit ermÃ¶glicht, sich auf ihre Kernaufgaben zu konzentrieren.\u003Cbr>&nbsp;\u003C/p>",{"__typename":230,"_id":231,"paragraph_id":232,"title":233,"intro":234,"fact_list_type":235,"facts":236},"FactsList","9b3d0cfd-f88f-4198-94ad-407ebbf29ef0",3504,"Ein flexibles Programm, das sich an Ihren BedÃ¼rfnissen orientiert","\u003Cp>Unsere LÃ¶sung kombiniert fÃ¼nf Bausteine mit einer Auswahl an individuell anpassbaren Modulen und wird Ã¼ber ein einfaches Abonnement bereitgestellt.\u003C/p>","icon",[237,243,248,253,258],{"__typename":238,"id":239,"title":240,"text":241,"icon_name":242,"image":218,"link":218},"Fact",3499,"I: Kick off","\u003Cp>Planen. Barrieren analysieren. Den Weg definieren.\u003C/p>","screen-users",{"__typename":238,"id":244,"title":245,"text":246,"icon_name":247,"image":218,"link":218},3500,"II: Informieren und schulen","\u003Cp>Vermitteln. Wissens- und KompetenzlÃ¼cken schliessen.\u003C/p>","scroll-old",{"__typename":238,"id":249,"title":250,"text":251,"icon_name":252,"image":218,"link":218},3501,"III: Security Adventures ","\u003Cp>Motivieren. Relevanz durch erlebnisorientierte Formate schaffen.\u003C/p>","roller-coaster",{"__typename":238,"id":254,"title":255,"text":256,"icon_name":257,"image":218,"link":218},3502,"IV: Tools und Prozesse","\u003Cp>ErmÃ¶glichen. Die passenden Strukturen und Voraussetzungen schaffen.\u003C/p>","toolbox",{"__typename":238,"id":259,"title":260,"text":261,"icon_name":262,"image":218,"link":218},3503,"V: Evaluation ","\u003Cp data-start=\"684\" data-end=\"743\">Evaluieren. Messen, was sich verÃ¤ndert hat.\u003C/p>","rocket-launch",{"__typename":264,"_id":265,"paragraph_id":266,"title":218,"items":267},"ImageTextList","470b10ab-c521-4ee2-8aaf-9016b27f32c0",3506,[268],{"__typename":269,"id":270,"_id":271,"title":272,"text":273,"cta":218,"cta_style":274,"image":275},"ImageTextItem",3505,"50d1d6f7-d442-401c-9739-a28202d3294b","Ein Abonnement.","\u003Cp>Durchgehende UnterstÃ¼tzung durch Expertinnen und Experten. Entwickelt fÃ¼r Sicherheitsverantwortliche, die Ergebnisse brauchen, nicht zusÃ¤tzliche Programme, die verwaltet werden mÃ¼ssen.\u003C/p>","primary",{"__typename":276,"src":277,"sources":278,"width":283,"height":283,"alt":284,"type":285,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/adventures.jpg?itok=atgN-1ED",[279],{"__typename":280,"src":281,"media":218,"sizes":282},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/adventures.jpg?itok=atgN-1ED 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/adventures.jpg?itok=YS1DIlzO 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/adventures.jpg?itok=B8-4LxKh 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/adventures.jpg?itok=pywu76Fk 1230w","(min-width: 984px) 51vw, 95vw",600,"security engagement kit","image/jpeg",{"__typename":225,"_id":287,"paragraph_id":288,"title":289,"text":290},"2cd06956-d37e-45b7-a518-b4d098d28aae",3507,"Security Adventures â€“ Lernen, wie Hacker denken","\u003Cp>Erreichen Sie nachhaltiges Engagement durch praxisnahe Security Erlebnisse: Â«Hack The HackerÂ» im Escape Room, Â«Track The HackerÂ» als Outdoor Quest, retten Sie Katzenvideos in unserer Â«Security ArcadeÂ» oder sichern Sie sich Ihr Â«Piece of CakeÂ» in unserem Tabletop Rollenspiel.\u003C/p>\u003Cp>Mehr dazu hier: \u003Ca href=\"/en/security-adventures\">\u003Cspan style=\"font-family:&quot;Euclid Circular B&quot;,sans-serif;\" lang=\"EN-GB\">Security Adventures\u003C/span>\u003C/a>\u003C/p>\u003Cp>\u003Cbr>MÃ¶chten Sie mehr erfahren? Unser Expertenteam ist fÃ¼r \u003Cstrong>Sie \u003C/strong>da!\u003C/p>",{"__typename":292,"_id":293,"paragraph_id":294,"title":295,"contact_boxes":296},"ContactBoxList","897c7d04-73c9-4c8a-83cc-0aafcd626c11",3515,"Noch Fragen?",[297,310,320,332],{"__typename":298,"name":299,"image":300,"phone_number":218,"e_mail_address":308,"job_title":309,"organisation":218},"ContactBox","Katja DÃ¶rlemann, PhD",{"__typename":276,"src":301,"sources":302,"width":283,"height":283,"alt":306,"type":307,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2025-09/katja_webb-1_1.png?itok=09sAvBcf",[303],{"__typename":280,"src":304,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2025-09/katja_webb-1_1.png?itok=76EUDSVb 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2025-09/katja_webb-1_1.png?itok=09sAvBcf 640w","100vw"," x","image/png","katja.doerlemann@switch.ch","Expert Human-Centred Security",{"__typename":298,"name":311,"image":312,"phone_number":218,"e_mail_address":319,"job_title":309,"organisation":218},"Cornelia Puhze ",{"__typename":276,"src":313,"sources":314,"width":317,"height":317,"alt":318,"type":285,"caption":318},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2024-08/cornelia-puhze-switch.jpg?itok=3pWyFm2f",[315],{"__typename":280,"src":316,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2024-08/cornelia-puhze-switch.jpg?itok=i_Z93KJr 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2024-08/cornelia-puhze-switch.jpg?itok=3pWyFm2f 640w",3730,"Cornelia Puhze, Security Awareness Specialist at ÂÌ²èÖ±²¥","cornelia.puhze@switch.ch",{"__typename":298,"name":321,"image":322,"phone_number":218,"e_mail_address":330,"job_title":331,"organisation":218},"Fabio Greiner ",{"__typename":276,"src":323,"sources":324,"width":327,"height":328,"alt":329,"type":285,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/website.jpg?itok=GGXIVwYC",[325],{"__typename":280,"src":326,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2026-03/website.jpg?itok=R7iT5ZGS 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/website.jpg?itok=GGXIVwYC 640w",4937,3840,"Fabio Greiner","Fabio.Greiner@switch.ch","Specialist Human-Centred Security",{"__typename":298,"name":333,"image":334,"phone_number":218,"e_mail_address":341,"job_title":342,"organisation":218},"CÃ©line Neubig",{"__typename":276,"src":335,"sources":336,"width":339,"height":339,"alt":340,"type":285,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/celine.jpg?itok=iLy3FaOm",[337],{"__typename":280,"src":338,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2026-03/celine.jpg?itok=E2Mlklw1 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/celine.jpg?itok=iLy3FaOm 640w",400,"celine n","celine.neubig@switch.ch","Educational Game Design","purple-red",1776792104394]