  [{"data":1,"prerenderedAt":402},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/track-hacker_de":194,"viewQuery_3457_DE":376},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"LÃ¶sungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Ãœber uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","ÂÌ²èÖ±²¥","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":374,"background_color":375,"teaser_title":202,"teaser_subtitle":218,"teaser_text":374},"DetailPage","deba7788-1dea-4c16-b8db-a058d3ad5da3",498,"Track The Hacker ","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/track-hacker",{"__typename":206,"language_id":210,"url":211},"DE","/de/track-hacker",{"__typename":206,"language_id":213,"url":214},"IT","/it/track-hacker",{"__typename":206,"language_id":216,"url":217},"FR","/fr/track-hacker",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":211,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Digitale FussabdrÃ¼cke orten und verfolgen Sicherheitsalarm! Ein krimineller Hacker ist heimlich in die RÃ¤umlichkeiten eingedrungen und hat wichtige Daten Ihrer Organisationen gestohlen. Jetzt ist er auf der Flucht und versucht, Ihre Daten zu verkaufen. KÃ¶nnen Sie seine digitalen FussabdrÃ¼cke zurÃ¼ckverfolgen und ihn aufspÃ¼ren?","Track The Hacker | ÂÌ²èÖ±²¥",[224,245,269,275,298,308],{"__typename":225,"_id":226,"paragraph_id":227,"title":228,"intro":229,"fact_list_type":230,"facts":231},"FactsList","4efc5815-13ec-41c7-ace7-45ffe7230e9d",3452,"Der Outdoor-Quest","\u003Cp>Sind Sie bereit fÃ¼r das Hacker-Abenteuer im Freien? Holen Sie Ihren Mantel! Die Mission Ihres Teams ist es, die gestohlenen Daten vom Hacker oder dem Ãœbergabeort zurÃ¼ckzuholen, bevor sie weiterverkauft werden. Folgen Sie den Hinweisen, entdecken Sie versteckte Winkel in ZÃ¼rich und lernen Sie auf spielerische Art, wie Sie online sicherer sind.\u003Cbr>&nbsp;\u003C/p>\u003Cp>Zusammen mit bis zu 6 Personen mÃ¼ssen Sie versuchen, seinen Aufenthaltsort zu finden, indem Sie seinen digitalen FussabdrÃ¼cken folgen.\u003Cbr>&nbsp;\u003C/p>","icon",[232,237,241],{"__typename":233,"id":234,"title":235,"text":218,"icon_name":236,"image":218,"link":218},"Fact",3449,"6 Spielende","users-gear",{"__typename":233,"id":238,"title":239,"text":218,"icon_name":240,"image":218,"link":218},3450,"2â€“3 Stunden","hourglass-clock",{"__typename":233,"id":242,"title":243,"text":218,"icon_name":244,"image":218,"link":218},3451,"Eine Mission","person-to-door",{"__typename":246,"_id":247,"paragraph_id":248,"title":218,"items":249},"ImageTextList","8791d999-8c3a-462a-b0a5-3871a904f31c",3525,[250],{"__typename":251,"id":252,"_id":253,"title":254,"text":255,"cta":218,"cta_style":256,"image":257},"ImageTextItem",3524,"9ca2a2bd-edf3-4c83-a657-3f1555a614c1","Lernziele","\u003Cp>Ziel dieses Abenteuers ist es, die Teilnehmer Ã¼ber die Bedeutung von Datenschutz und Datensicherheit sowie Ã¼ber die Risiken von Social-Engineering-Taktiken aufzuklÃ¤ren. Das Spiel zeigt, wie wichtig es ist, persÃ¶nliche und sensible Informationen vor unbefugtem Zugriff oder Offenlegung zu schÃ¼tzen.\u003C/p>\u003Cp>&nbsp;\u003C/p>","primary",{"__typename":258,"src":259,"sources":260,"width":265,"height":266,"alt":267,"type":268,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=z-GEx8Io",[261],{"__typename":262,"src":263,"media":218,"sizes":264},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=z-GEx8Io 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=-fztLET3 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=V383pLsx 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=EcHWhmO3 1230w","(min-width: 984px) 51vw, 95vw",1500,900,"hucs track the hacker","image/jpeg",{"__typename":270,"_id":271,"paragraph_id":272,"title":273,"text":274},"TextItem","f06a8cca-6e86-41c2-8643-1f20647f90e4",3453,"Ihre Daten sind wertvoll  ","\u003Cp>Eine ganze Industrie hat sich um den Handel mit gestohlenen Daten entwickelt. Expert*innen schÃ¤tzen, dass dieser Markt 160 Milliarden USD generiert. Der Schutz von Daten wird immer schwieriger, wÃ¤hrend wir gleichzeitig mehr Daten als je zuvor erzeugen â€“ sei es Ã¼ber soziale Medien, Apps, Smartwatches oder Smart-Home-GerÃ¤te.\u003C/p>\u003Cp>Im Jahr 2019 entdeckten Forschende auf dem Dark Web die Sammlung â€žCollection#1â€œ, die 774 Millionen E-Mail-Adressen und 21 Millionen PasswÃ¶rter zum Verkauf enthielt.\u003C/p>",{"__typename":276,"_id":277,"paragraph_id":278,"title":279,"attributes":280,"video_url":297},"VideoEmbed","989e273b-c1eb-4142-8bf3-9d4e1887ce66",3454,"Track The Hacker â€“ ein Security Adventure von ÂÌ²èÖ±²¥",[281,285,287,289,291,293,295],{"__typename":282,"name":283,"value":284},"VideoEmbedAttribute","download","1",{"__typename":282,"name":286,"value":284},"forms",{"__typename":282,"name":288,"value":284},"allow-same-origin",{"__typename":282,"name":290,"value":284},"scripts",{"__typename":282,"name":292,"value":284},"allow-top-navigation",{"__typename":282,"name":294,"value":284},"allowfullscreen",{"__typename":282,"name":296,"value":284},"autoplay","https://switch.mediaspace.cast.switch.ch/embed/secure/iframe/entryId/0_i4r3mf9c/uiConfId/23449074/st/0",{"__typename":299,"_id":300,"paragraph_id":301,"title":302,"contact_boxes":303},"ContactBoxList","3703a5fb-a21a-401b-a2ef-317192c00f0e",3456,"Noch Fragen?",[304],{"__typename":305,"name":306,"image":218,"phone_number":218,"e_mail_address":307,"job_title":218,"organisation":218},"ContactBox","Human Centred Security Team","hucs@switch.ch",{"__typename":309,"_id":310,"paragraph_id":311,"title":52,"langcode":210,"preseselected_field_event_type_target_id":312,"preseselected_field_topics_target_id":320,"next_events":323,"events_overview_page":364},"NextEvents","fe3cda52-ed62-4e99-93d1-f024db3993d1",3457,[313,317],{"__typename":314,"id":315,"name":316},"TaxonomyTerm",23,"Community Event",{"__typename":314,"id":318,"name":319},24,"Ã–ffentlicher Event",[321],{"__typename":314,"id":322,"name":17},9,{"__typename":324,"display_id":325,"view_id":326,"available_exposed_filters":327,"available_contextual_filters":358,"pager":359},"View","next_events","events_overview",[328,350],{"__typename":329,"field_name":330,"filter_label":331,"options":332},"ViewsExposedFilter","field_topics_target_id","Kompetenzbereich",[333,336,339,341,343,345,347],{"__typename":334,"id":335,"label":17},"ViewsExposedFilterOptions","9",{"__typename":334,"id":337,"label":338},"10","Cloud Services & Video",{"__typename":334,"id":340,"label":114},"13",{"__typename":334,"id":342,"label":32},"11",{"__typename":334,"id":344,"label":37},"15",{"__typename":334,"id":346,"label":42},"12",{"__typename":334,"id":348,"label":349},"16","eduhub",{"__typename":329,"field_name":351,"filter_label":352,"options":353},"field_event_type_target_id","Art des Events",[354,356],{"__typename":334,"id":355,"label":316},"23",{"__typename":334,"id":357,"label":319},"24","langcode,excluded_nid",{"__typename":360,"pager_type":361,"total_pages":362,"items_per_page":363},"ViewsPager","full",2,3,{"__typename":365,"alternates":366},"LandingPage",[367,369,370,372],{"__typename":206,"language_id":207,"url":368},"/en/events",{"__typename":206,"language_id":210,"url":54},{"__typename":206,"language_id":213,"url":371},"/it/node/215",{"__typename":206,"language_id":216,"url":373},"/fr/events","Digitale FussabdrÃ¼cke orten und verfolgen\r\nSicherheitsalarm! Ein krimineller Hacker ist heimlich in die RÃ¤umlichkeiten eingedrungen und hat wichtige Daten Ihrer Organisationen gestohlen. Jetzt ist er auf der Flucht und versucht, Ihre Daten zu verkaufen. KÃ¶nnen Sie seine digitalen FussabdrÃ¼cke zurÃ¼ckverfolgen und ihn aufspÃ¼ren?","blue-purple",{"data":377,"loading":186,"networkStatus":187},{"view":378},{"__typename":324,"view_id":326,"field_settings":218,"result_count":362,"pager":379,"result":381},{"__typename":360,"items_per_page":363,"pager_type":361,"total_pages":380},1,[382,393],{"__typename":383,"nid":384,"title":385,"teaser_text":386,"url":387,"teaser_title":385,"infos_date":388,"infos_location":392,"teaser_subtitle":218},"EventDetailPage",503,"Human Centred Security Day 2026","Am Human Centred Security Day von ÂÌ²èÖ±²¥ werfen wir einen praxisnahen Blick auf aktuelle Herausforderungen der Cybersicherheit.\r\n\r\nIm Fokus steht, sicheres Verhalten im Alltag zu erleichtern, ergÃ¤nzt durch Einblicke in Human Risk, KI-bezogene Bedrohungen und Sicherheitskultur sowie Austausch mit Fachpersonen.","/de/human-centred-security-day-2026",{"__typename":389,"date_range":390,"time_range":391},"DateRangeItem","22. Okt. 2026","8:30â€“17:30","Zentrum Paul Klee, Monument im Fruchtland 3, 3006 Bern",{"__typename":383,"nid":394,"title":395,"teaser_text":396,"url":397,"teaser_title":395,"infos_date":398,"infos_location":401,"teaser_subtitle":218},505,"ICT Focus 2026","Die Veranstaltung ICT Focus bringt EntscheidungstrÃ¤gerinnen und -trÃ¤ger aus den Bereichen Bildung, Forschung und Innovation in der ganzen Schweiz zusammen sowie Mitglieder der Leitungsgremien von ÂÌ²èÖ±²¥, einschliesslich Stiftungsrat und Ausschuss.\r\nDie Veranstaltung richtet sich traditionell an FÃ¼hrungskrÃ¤fte von IT- und Serviceabteilungen an Schweizer Hochschulen und Forschungsinstitutionen.\r\nICT Focus - Verbindet KÃ¶pfe. Schafft Zukunft.","/de/ict-focus-2026",{"__typename":389,"date_range":399,"time_range":400},"25. Nov. 2026","8:30â€“14:30","Verkehrshaus Luzern",1776427006412]