{"id":7060,"date":"2024-04-26T10:10:00","date_gmt":"2024-04-26T08:10:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=7060"},"modified":"2026-03-02T17:50:20","modified_gmt":"2026-03-02T16:50:20","slug":"directors-and-officers-liability","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/geschaeftsfuehrerhaftung\/","title":{"rendered":"Management liable for cyberattacks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7060\" class=\"elementor elementor-7060\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53134bde e-con-full e-flex e-con e-parent\" data-id=\"53134bde\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5484aaeb elementor-widget elementor-widget-text-editor\" data-id=\"5484aaeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\"><strong data-start=\"73\" data-end=\"136\">Cyber attacks are a matter for the boss<\/strong><\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p class=\"wp-block-heading\">Managing directors are legally responsible for ensuring that IT and information security is not just treated as an IT issue, but as a business risk. Omitted or inadequate protective measures can lead to personal liability in the event of damage - from financial losses to criminal liability.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>If the management level is even aware of the insecure IT environment, there is even a risk of personal liability, at the latest since the new\u00a0<a href=\"https:\/\/defenderbox.de\/en\/defenderbox\/nis2-cyber-resilience\/\">NIS-2 Directive<\/a>. However, the obligations of the company and its management in connection with IT security are not regulated centrally by law. Instead, they arise from various regulations and standards, such as the GDPR.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The Management Board is <a href=\"https:\/\/defenderbox.de\/en\/bvd-2\/\">\u00a7 Section 91 (2) AktG<\/a> to take appropriate measures to ensure that developments that could jeopardize the continued existence of the company are identified at an early stage. Furthermore, in most cases, the functionality of the IT systems is necessary to maintain the company's business operations. There is a dual responsibility, so to speak, as to why the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">IT security<\/a> The core task of the management level is: On the one hand, because the functionality of the IT system must be protected as an operationally necessary component of the company, and on the other hand, because the management must ensure that the company complies with the GDPR and applicable special IT laws as part of its duty of legality.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Did you know that the organizational duties to protect IT systems are not only the responsibility of the member of management directly responsible for IT security, but are shared by all managing directors?<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The Executive Board has overall responsibility here. The Executive Board as a collegial body\u00a0<strong>must<\/strong>\u00a0make the fundamental decisions as to which precautions and measures are to be taken to protect the IT systems.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #000000;\">What can you do?<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>In order to exclude personal liability, there are guidelines and key points that must be observed:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>The management level must initiate the use of suitable security measures and ensure that appropriate resources are available. The core objective at this level is to enable the company to recognize hazards.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The security measures must be appropriate. The \"business judgment rule\" also plays a role here. Companies that operate extensively with sensitive data must take different measures than an industrial company that is only active in the B2B segment.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The security measures should reflect recognized rules. These include the BSI's IT baseline protection or certification and auditing specifications such as ISO27001 or Vds10000, the latter at least for small and medium-sized companies.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The management level must monitor the entire process and also the further application.\u00a0<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p>\u00a0<\/p>\n<p><strong>However, the management is and remains ultimately responsible. Because\u00a0<\/strong><strong data-start=\"701\" data-end=\"783\">Cybersecurity is not an IT add-on - it is a management and compliance issue.<\/strong><\/p>\n<p>This applies all the more to the important and particularly important institutions addressed by the new IT security law.<\/p>\n<p>What are your security measures? Do you know your <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Security gaps<\/a>?<\/p>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:columns --><!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Did you know that you are liable for cyber damages?<\/p>","protected":false},"author":3,"featured_media":7048,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,45,40,37,36],"class_list":["post-7060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-geschaeftsfuehrerhaftung","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/directors-and-officers-liability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/directors-and-officers-liability\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T08:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T16:50:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/Bildschirmfoto-2024-04-03-um-15.41.29.png\" \/>\n\t<meta property=\"og:image:width\" content=\"776\" \/>\n\t<meta property=\"og:image:height\" content=\"494\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken\",\"datePublished\":\"2024-04-26T08:10:00+00:00\",\"dateModified\":\"2026-03-02T16:50:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/\"},\"wordCount\":460,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Bildschirmfoto-2024-04-03-um-15.41.29.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Gesch\u00e4ftsf\u00fchrerhaftung\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/\",\"name\":\"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Bildschirmfoto-2024-04-03-um-15.41.29.png\",\"datePublished\":\"2024-04-26T08:10:00+00:00\",\"dateModified\":\"2026-03-02T16:50:20+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Bildschirmfoto-2024-04-03-um-15.41.29.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Bildschirmfoto-2024-04-03-um-15.41.29.png\",\"width\":776,\"height\":494,\"caption\":\"Als Gesch\u00e4ftsf\u00fchrung hasten Sie bei Cyberattacken\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/geschaeftsfuehrerhaftung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Management liable for cyberattacks - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/directors-and-officers-liability\/","og_locale":"en_US","og_type":"article","og_title":"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/directors-and-officers-liability\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-04-26T08:10:00+00:00","article_modified_time":"2026-03-02T16:50:20+00:00","og_image":[{"width":776,"height":494,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/Bildschirmfoto-2024-04-03-um-15.41.29.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken","datePublished":"2024-04-26T08:10:00+00:00","dateModified":"2026-03-02T16:50:20+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/"},"wordCount":460,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/Bildschirmfoto-2024-04-03-um-15.41.29.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Gesch\u00e4ftsf\u00fchrerhaftung","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/","url":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/","name":"Management liable for cyberattacks - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/Bildschirmfoto-2024-04-03-um-15.41.29.png","datePublished":"2024-04-26T08:10:00+00:00","dateModified":"2026-03-02T16:50:20+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/Bildschirmfoto-2024-04-03-um-15.41.29.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/Bildschirmfoto-2024-04-03-um-15.41.29.png","width":776,"height":494,"caption":"Als Gesch\u00e4ftsf\u00fchrung hasten Sie bei Cyberattacken"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/geschaeftsfuehrerhaftung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Gesch\u00e4ftsf\u00fchrung haftet bei Cyberattacken"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=7060"}],"version-history":[{"count":9,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7060\/revisions"}],"predecessor-version":[{"id":26898,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7060\/revisions\/26898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/7048"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=7060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=7060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=7060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}