{"id":4999,"date":"2022-09-05T09:07:34","date_gmt":"2022-09-05T07:07:34","guid":{"rendered":"https:\/\/cyberfunk-security.com\/?page_id=4999"},"modified":"2022-10-11T09:22:55","modified_gmt":"2022-10-11T07:22:55","slug":"uber-uns","status":"publish","type":"page","link":"https:\/\/cyberfunk-security.com\/kl\/uber-uns\/","title":{"rendered":"\u00dcber uns"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4999\" class=\"elementor elementor-4999\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-678a621 elementor-section-content-middle elementor-section-stretched elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"678a621\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a2a388\" data-id=\"6a2a388\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cfc374a elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"cfc374a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9d667a0 servbanner_left\" data-id=\"9d667a0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76bf3af uberhd elementor-widget elementor-widget-heading\" data-id=\"76bf3af\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Unsere <strong>Mission<\/strong><\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd6fd2 elementor-widget elementor-widget-heading\" data-id=\"bcd6fd2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Cyberfunk Security ist ein junges und agiles deutsches Sicherheitsunternehmen mit einem gro\u00dfen Ziel: Den Status quo im Bereich der Cybersicherheit zu ver\u00e4ndern und die als kompliziert empfundene Fachsprache der \u201eCyberwelt\u201c verst\u00e4ndlich und f\u00fcr alle Entscheider aus Privatwirtschaft und Politik begreifbar zu machen. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de12e2f arrowani elementor-widget elementor-widget-image\" data-id=\"de12e2f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ft\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"21\" height=\"17\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cfunk_scroll-down-arrow.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e879113 servbaner_right\" data-id=\"e879113\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9526e29 elementor-widget elementor-widget-image\" data-id=\"9526e29\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"545\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/mission.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4196197 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4196197\" data-element_type=\"section\" id=\"ft\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52ffac4\" data-id=\"52ffac4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d3b3e2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d3b3e2a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-62ebab1\" data-id=\"62ebab1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f713dd elementor-widget elementor-widget-image\" data-id=\"4f713dd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"259\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cyberfunk-security_made-and-hosted-in-germany_new-white.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fd5dfe servhead breaks elementor-widget elementor-widget-heading\" data-id=\"7fd5dfe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Wir managen <br\/>\nCyber-Risiken f\u00fcr <br\/>\nUnternehmen und <br\/>\nBeh\u00f6rden in der <br\/>\nDACH-Region<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8fce328\" data-id=\"8fce328\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1bb754d elementor-widget elementor-widget-heading\" data-id=\"1bb754d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Gemeinsam mit unseren Kunden, den mittelst\u00e4ndischen Unternehmen \u2013 arbeiten wir zusammen, um das Verst\u00e4ndnis f\u00fcr die IT-Sicherheit zu verbessern, sich auf die wachsenden Bedrohungen aus dem Internet und dem Darknet vorzubereiten und gegen Hackerangriffe und Erpresser bestens gewappnet zu sein. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1114283 elementor-widget elementor-widget-heading\" data-id=\"1114283\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Auf diese Art und Weise wollen wir mittelst\u00e4ndische Unternehmen und \u00f6ffentliche Einrichtungen fit f\u00fcr die immer komplexere Welt der Internetkriminalit\u00e4t machen und sie vor Angriffen und Erpressungen aus dem Internet sch\u00fctzen. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-245d54f elementor-widget elementor-widget-heading\" data-id=\"245d54f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Durch bew\u00e4hrte Technologien, wie Darknet Monitoring, Red Teaming, Threat Intelligence und 24x7 Incident Response machen wir sie fit f\u00fcr die moderne Cyberwelt mit allen ihren aktuellen Herausforderungen. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b66eed elementor-widget elementor-widget-heading\" data-id=\"2b66eed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Unser erfahrenes Team arbeitet an vorderster Front und vereint hunderte von Ermittler, Techniker und Risikomanager mit den besten Daten- und Software-Ingenieuren der Branche. Wir bringen eine unerm\u00fcdliche Leidenschaft f\u00fcr Innovation und ein Engagement f\u00fcr die Bek\u00e4mpfung der Internetkriminalit\u00e4t mit.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06f77f9 elementor-widget elementor-widget-heading\" data-id=\"06f77f9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Mit der gleichen Leidenschaft setzen wir uns f\u00fcr den Schutz von Unternehmen, Regierungen und Infrastrukturen vor Cyberkriminellen ein und geben unserer Gemeinschaft etwas zur\u00fcck. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50ac473 elementor-widget elementor-widget-heading\" data-id=\"50ac473\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Wir nutzen die Informationen und Erkenntnisse aus unseren Untersuchungen von Sicherheitsverletzungen, um Strafverfolgungsbeh\u00f6rden, gemeinn\u00fctzige Organisationen und Regierungen bei der Bek\u00e4mpfung von Cyberkriminalit\u00e4t zu helfen.  <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d92694e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d92694e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0033619\" data-id=\"0033619\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1378596 elementor-widget elementor-widget-image\" data-id=\"1378596\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1261\" height=\"816\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/composition_about-us.svg\" class=\"attachment-2048x2048 size-2048x2048\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-70e3bc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"70e3bc4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c438000\" data-id=\"c438000\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fc7566 elementor-widget elementor-widget-heading\" data-id=\"1fc7566\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DIE GR\u00dcNDERSTORY<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7815248 diehead elementor-widget elementor-widget-heading\" data-id=\"7815248\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Erfahren Sie wer wir sind und was \u2028<br\/>\nuns motiviert hat ein neues und agiles \u2028<br\/> Unternehmen zu gr\u00fcnden<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0b8a119 elementor-section-content-middle dieteam elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b8a119\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f1e4fd\" data-id=\"5f1e4fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed78c04 elementor-widget elementor-widget-image\" data-id=\"ed78c04\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cf_kader.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3eb73ab\" data-id=\"3eb73ab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-669c0bf servhead elementor-widget elementor-widget-heading\" data-id=\"669c0bf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Kader Cornelius ist gelernter Koch aus der Sternegastronomie und seit fast 15 Jahren im Bereich Threat Intelligence und Cybercrime Research t\u00e4tig. <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d8a025 elementor-widget elementor-widget-heading\" data-id=\"3d8a025\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Nach einem Todesfall in der Familie machte er sein Hobby zur Berufung. \n\nSeitdem hat Kader sich in der deutschsprachigen Cybersicherheits-Community durch enge Kooperationen mit Unternehmen und verschiedenen Strafverfolgungsbeh\u00f6rden einen Namen gemacht.\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5075d2a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5075d2a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dd8adda\" data-id=\"dd8adda\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e5e515 elementor-widget elementor-widget-image\" data-id=\"1e5e515\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cf_wasilij.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b33867b\" data-id=\"b33867b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea68680 servhead elementor-widget elementor-widget-heading\" data-id=\"ea68680\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Wasilij Geist hat \u00fcber 15 Jahren Erfahrung im Bereich IT und Cybersicherheit. <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b6c606 elementor-widget elementor-widget-heading\" data-id=\"0b6c606\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Er war 8 Jahre lang im Management eines namhaften und privatgef\u00fchrten Sicherheitsunternehmens. Er schuf neue Gesch\u00e4ftsfelder im Bereich Automotive und Industrial Cybersecurity und f\u00fchrte neue Dienstleistungen, wie Cyberversicherungen und Drohnenabwehr ein. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ba2daff elementor-section-content-middle dieteam elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba2daff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2b284ca\" data-id=\"2b284ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40dedfb elementor-widget elementor-widget-image\" data-id=\"40dedfb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cf_andrej.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9af6439\" data-id=\"9af6439\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cdd4e13 servhead elementor-widget elementor-widget-heading\" data-id=\"cdd4e13\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Andrej von Berg hat 10 Jahre lang Wachstum erm\u00f6glicht. Er hat im Retail gearbeitet und Start-ups zur Skalierung gef\u00fchrt. <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84c7f8d elementor-widget elementor-widget-heading\" data-id=\"84c7f8d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Andrej war Direktor im Finanzbereich und leitete Wachstumsprojekte in Millionenh\u00f6he, die zu einem h\u00f6heren Marktanteil f\u00fchrten. Er analysiert und prognostiziert Finanzdaten, die zu einem positiven Cashflow f\u00fchren. Andrej hat einen MBA der Universit\u00e4t St. Gallen mit den Schwerpunkten Business Planning und Cash Flow Management.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-586efe3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"586efe3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b79c8e\" data-id=\"9b79c8e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da9152a elementor-widget elementor-widget-heading\" data-id=\"da9152a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Noch mehr \u00fcber uns<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6924a5 diehead elementor-widget elementor-widget-heading\" data-id=\"f6924a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Presse & Medien<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-48a12dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48a12dc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0a81622 mr\" data-id=\"0a81622\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab4f77a elementor-widget elementor-widget-text-editor\" data-id=\"ab4f77a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_logo_for-press-section_about-us.png\" \/><\/figure><h3>\u00abIn den sozialen Medien gibt es praktisch keine H\u00fcrden mehr\u00bb<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.beobachter.ch\/digital\/handel-mit-kinderpornografie-in-den-sozialen-medien-gibt-es-praktisch-keine-hurden-mehr\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fa65524 ml\" data-id=\"fa65524\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-deb093e elementor-widget elementor-widget-text-editor\" data-id=\"deb093e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_logo_for-press-section_about-us.png\" \/><\/figure><h3>Underground <br \/>Economy<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.amazon.de\/Underground-Economy-Cyberkriminelle-Wirtschaft-bedrohen\/dp\/3907291670\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><div class=\"ptimg\"><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/economy.jpg\" \/><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6d7f287 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d7f287\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-311bf9d mr\" data-id=\"311bf9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c4a589 elementor-widget elementor-widget-text-editor\" data-id=\"9c4a589\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/03_logo_for-press-section_about-us.png\" \/><\/figure><h3>Kriminelle haben in einem Jahr Daten von 2700 Schweizer Firmen geklaut<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.inside-it.ch\/post\/bericht-kriminelle-haben-in-einem-jahr-daten-von-2700-schweizer-firmen-geklaut-20211008\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3a0db43 ml\" data-id=\"3a0db43\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e67344c elementor-widget elementor-widget-text-editor\" data-id=\"e67344c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/04_logo_for-press-section_about-us.png\" \/><\/figure><h3>Cyberkriminalit\u00e4t boomt \u2013<br \/>Jetzt kann jeder mit Hacken Geld machen<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.blick.ch\/schweiz\/cyberkriminalitaet-boomt-jetzt-kann-jeder-mit-hacken-geld-machen-id17495294.html\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bae3144 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bae3144\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-07c83a4 mr\" data-id=\"07c83a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6c5ba5 elementor-widget elementor-widget-text-editor\" data-id=\"d6c5ba5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/078_logo_for-press-section_about-us.png\" \/><\/figure><h3>Schweizer Firmen sehen sich mit Cyber-Attacken und L\u00f6segeld-forderungen konfrontiert<\/h3><div class=\"readmore\"><a href=\"https:\/\/snbchf.com\/2021\/10\/more-swiss-firms-facing-cyber-attacks-ransom-demands\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bb365d3 ml\" data-id=\"bb365d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ca24a5 elementor-widget elementor-widget-text-editor\" data-id=\"7ca24a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/06_logo_for-press-section_about-us.svg\" \/><\/figure><h3>Sensible Daten als Geisel, L\u00f6segeld gegen Code \u2013 Unterwegs mit dem Cyberj\u00e4ger<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.welt.de\/wirtschaft\/plus238479523\/Erpressung-von-Firmen-Sensible-Daten-als-Geisel-Loesegeld-gegen-Code-Unterwegs-mit-dem-Cyberjaeger.html\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6844e78 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6844e78\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e25b873 mr\" data-id=\"e25b873\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5be8bd2 elementor-widget elementor-widget-text-editor\" data-id=\"5be8bd2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/07_logo_for-press-section_about-us.png\" \/><\/figure><h3>Cyberkriminalit\u00e4t in der DACH-Region und Ransomware in LATAM<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/10\/vb2020-tips-presentations-cybercrime-dach-region-and-ransomware-latam\/\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1e0fdc4 ml\" data-id=\"1e0fdc4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8285d1 elementor-widget elementor-widget-text-editor\" data-id=\"f8285d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"presse_box\"><figure><img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/05_logo_for-press-section_about-us.png\" \/><\/figure><h3>2700 Cyberangriffe auf Schweizer Unternehmen innerhalb eines Jahres<\/h3><div class=\"readmore\"><a href=\"https:\/\/www.netzwoche.ch\/news\/2021-10-07\/2700-cyberangriffe-auf-schweizer-unternehmen-innerhalb-eines-jahres\" target=\"_blank\" rel=\"noopener\">Mehr erfahren <img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/arrow-right-copy-3.svg\" \/><\/a><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Unsere Mission Cyberfunk Security ist ein junges und agiles deutsches Sicherheitsunternehmen mit einem gro\u00dfen Ziel: Den Status quo im Bereich der Cybersicherheit zu ver\u00e4ndern und die als kompliziert empfundene Fachsprache der \u201eCyberwelt\u201c verst\u00e4ndlich und f\u00fcr alle Entscheider aus Privatwirtschaft und Politik begreifbar zu machen. Wir managen Cyber-Risiken f\u00fcr Unternehmen und Beh\u00f6rden in der DACH-Region Gemeinsam [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-4999","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages\/4999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/comments?post=4999"}],"version-history":[{"count":4,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages\/4999\/revisions"}],"predecessor-version":[{"id":5439,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages\/4999\/revisions\/5439"}],"wp:attachment":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/media?parent=4999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}