{"id":117813,"date":"2025-12-08T09:25:02","date_gmt":"2025-12-08T08:25:02","guid":{"rendered":"https:\/\/premium-speakers.com\/?p=117813"},"modified":"2026-03-17T15:26:26","modified_gmt":"2026-03-17T14:26:26","slug":"the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/","title":{"rendered":"The most knowledgeable speakers on cybercrime and cybersecurity"},"content":{"rendered":"\n<p><strong>Cybercrime: When the attack is just a click away<\/strong><\/p>\n\n\n\n<p>It often starts innocently enough. An email, seemingly from the CEO. A link that points to a familiar platform. An attachment with the promising title \u2018Strategy Q4\u2019. And with just one click, it&#8217;s done: the attack is underway.<\/p>\n\n\n\n<p><strong>Cybercrime is no longer just a topic for tech nerds in dark basements.<\/strong> It has become part of the global power game \u2013 with billions in damages, compromised infrastructures and an alarming knowledge deficit in many companies.<\/p>\n\n\n\n<p>But there are people who are fighting precisely that. People who understand attacks before they happen. Who explain how we can protect ourselves \u2013 and what happens if we don&#8217;t.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-top-speakers-on-cybercrime-and-cyber-security-who-know-what-they-are-talking-about\">Top speakers on cybercrime and cyber security who know what they are talking about:<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/thomas-r-koehler\/\" target=\"_blank\" rel=\"noreferrer noopener\">Thomas R. K\u00f6hler<\/a><\/strong> \u2013 He is one of the most renowned experts on IT security in the German-speaking world. Thomas R. K\u00f6hler explains in an understandable way where digital vulnerability begins \u2013 and how companies can systematically arm themselves against it. With a clear view of technology, strategy and human behaviour.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/janka-kreisl\/\" target=\"_blank\" rel=\"noreferrer noopener\">Janka Krei\u00dfl <\/a><\/strong>\u2013 a crisis manager specialising in cyber attacks \u2013 is one of Germany\u2019s leading experts in crisis and cyber communication.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/suzanne-grieger-langer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suzanne Grieger-Langer<\/a><\/strong> \u2013 The profiler among cyber speakers. She talks about digital manipulation, social engineering and psychological attack vectors. Her motto: If you understand people, you also recognise their digital weaknesses \u2013 and can protect them.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/keren-elazari\/\" target=\"_blank\" rel=\"noreferrer noopener\">Keren Elazari<\/a><\/strong> \u2013 The Friendly Hacker, also known as k3r3n3, is an international cybersecurity thought leader. Keren shows how hackers think \u2013 and why you need to understand them in order to protect yourself effectively. Her lectures combine high-tech with social responsibility.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/dennis-kenji-kipker\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dennis-Kenji Kipker<\/a><\/strong> \u2013 IT security lawyer and one of the most sought-after experts on digital regulation in Europe. He clearly explains the legal framework of cyber security \u2013 from GDPR to cyber defence law.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/alexandra-forsyth\/\" target=\"_blank\" rel=\"noreferrer noopener\">Alexandra Forsyth<\/a><\/strong> \u2013 Expert in cloud security and international IT infrastructures. She combines strategic vision with in-depth technical knowledge \u2013 ideal for companies that want to make their security architecture future-proof.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/jay-tuck\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jay Tuck<\/a><\/strong> \u2013 War correspondent, security expert and investigative journalist, Jay Tuck is a sought-after speaker on military cyber defence, artificial intelligence and espionage technologies. He reveals what often remains hidden \u2013 and what that means for the civilian world.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/peter-hacker\/\" target=\"_blank\" rel=\"noreferrer noopener\">Peter Hacker<\/a><\/strong> \u2013 Global expert on cyber risks in the financial sector, geopolitical threat scenarios and large-scale digital attacks. He analyses what happens when digital weaknesses become a global threat.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/mark-t-hofmann\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mark T. Hofmann<\/a><\/strong> \u2013 Criminal and business psychologist specialising in the psychology of hackers, criminals and digital offenders. He shows how to use offender profiles to make systems and people more resilient.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/fil-team-red\/\" target=\"_blank\" rel=\"noreferrer noopener\">FIL Red Team<\/a><\/strong> \u2013 Ethical hackers with a special forces mentality. They simulate real attacks on companies \u2013 to uncover vulnerabilities before real criminals do. Their presentations are live, interactive and highly exciting.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/ben-owen\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ben Owen<\/a><\/strong> \u2013 Former British intelligence officer and expert in digital forensics and real-time crime investigation. Known from TV shows such as Hunted, he brings real-life case studies to the stage \u2013 with depth and drama.<\/p>\n\n\n\n<p><strong>What our speakers convey about cybercrime and cybersecurity:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Current threats such as ransomware, phishing, deep fakes and insider attacks.<\/li>\n\n\n\n<li>Security strategies for companies, authorities and individuals.<\/li>\n\n\n\n<li>Real-time cyber defence: how do I respond in an emergency?<\/li>\n\n\n\n<li>Artificial intelligence in IT security \u2013 curse or opportunity?<\/li>\n\n\n\n<li>Data protection, law and regulation: what is mandatory, what is optional?<\/li>\n\n\n\n<li>Security culture in companies \u2013 why technology alone is not enough<\/li>\n\n\n\n<li>Live demos and hacking simulations: how real attackers think<\/li>\n<\/ul>\n\n\n\n<p><strong>Security begins with knowledge<\/strong><\/p>\n\n\n\n<p><strong>Cybersecurity is not just an IT issue.<\/strong> It affects every manager, every organisation and every individual. Our speakers don&#8217;t spread panic \u2013 they provide solutions, strategies and real eye-opening moments. They open your eyes to the reality of digital threats \u2013 and show you how to be prepared instead of surprised.<\/p>\n\n\n\n<p><strong>Book the best speakers on cybercrime and digital security now \u2013 at Premium Speakers: <a href=\"tel:17048041054\"><i class=\"far fa-phone-alt fa-fw me-1\"><\/i>+1 (704) 804 1054<\/a> or <a href=\"mailto:welcome@premium-speakers.com\"><i class=\"far fa-envelope fa-fw me-1\"><\/i>welcome@premium-speakers.com<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime: When the attack is just a click away It often starts innocently enough. An email, seemingly from the CEO. [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":117809,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"footnotes":""},"categories":[16563],"tags":[],"class_list":["post-117813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-topics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The most knowledgeable speakers on cybercrime &amp; cybersecurity<\/title>\n<meta name=\"description\" content=\"The best speakers on cyber security, cyber crime and hacker attacks. Book speakers on cyber crime, IT security and data protection now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The most knowledgeable speakers on cybercrime and cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The best speakers on cyber security, cyber crime and hacker attacks. Book speakers on cyber crime, IT security and data protection now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Premium Speakers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PremiumSpeakers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-08T08:25:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T14:26:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mandy Weinand\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PremiumSpeakers\" \/>\n<meta name=\"twitter:site\" content=\"@PremiumSpeakers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mandy Weinand\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\"},\"author\":{\"name\":\"Mandy Weinand\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146\"},\"headline\":\"The most knowledgeable speakers on cybercrime and cybersecurity\",\"datePublished\":\"2025-12-08T08:25:02+00:00\",\"dateModified\":\"2026-03-17T14:26:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg\",\"articleSection\":[\"Blog about Categories \/ Topics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\",\"url\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\",\"name\":\"The most knowledgeable speakers on cybercrime & cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg\",\"datePublished\":\"2025-12-08T08:25:02+00:00\",\"dateModified\":\"2026-03-17T14:26:26+00:00\",\"description\":\"The best speakers on cyber security, cyber crime and hacker attacks. Book speakers on cyber crime, IT security and data protection now.\",\"breadcrumb\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg\",\"width\":2048,\"height\":1152,\"caption\":\"Keynote Speakers on cybercrime and cybersecurity - Premium Speakers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/premium-speakers.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The most knowledgeable speakers on cybercrime and cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#website\",\"url\":\"https:\/\/premium-speakers.com\/en\/\",\"name\":\"Premium Speakers\",\"description\":\"Agentur f\u00fcr Referenten Vermittlung\",\"publisher\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/premium-speakers.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\",\"name\":\"Premium Speakers\",\"url\":\"https:\/\/premium-speakers.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png\",\"width\":1534,\"height\":722,\"caption\":\"Premium Speakers\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PremiumSpeakers\",\"https:\/\/x.com\/PremiumSpeakers\",\"https:\/\/www.instagram.com\/premium_speakers\/\",\"https:\/\/www.linkedin.com\/company\/premium-speakers\",\"https:\/\/www.youtube.com\/channel\/UCrb9-cJEYUpbyi6KMAmZlCQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146\",\"name\":\"Mandy Weinand\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg\",\"caption\":\"Mandy Weinand\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The most knowledgeable speakers on cybercrime & cybersecurity","description":"The best speakers on cyber security, cyber crime and hacker attacks. Book speakers on cyber crime, IT security and data protection now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The most knowledgeable speakers on cybercrime and cybersecurity","og_description":"The best speakers on cyber security, cyber crime and hacker attacks. Book speakers on cyber crime, IT security and data protection now.","og_url":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/","og_site_name":"Premium Speakers","article_publisher":"https:\/\/www.facebook.com\/PremiumSpeakers","article_published_time":"2025-12-08T08:25:02+00:00","article_modified_time":"2026-03-17T14:26:26+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg","type":"image\/jpeg"}],"author":"Mandy Weinand","twitter_card":"summary_large_image","twitter_creator":"@PremiumSpeakers","twitter_site":"@PremiumSpeakers","twitter_misc":{"Written by":"Mandy Weinand","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/"},"author":{"name":"Mandy Weinand","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146"},"headline":"The most knowledgeable speakers on cybercrime and cybersecurity","datePublished":"2025-12-08T08:25:02+00:00","dateModified":"2026-03-17T14:26:26+00:00","mainEntityOfPage":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/"},"wordCount":653,"publisher":{"@id":"https:\/\/premium-speakers.com\/en\/#organization"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg","articleSection":["Blog about Categories \/ Topics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/","url":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/","name":"The most knowledgeable speakers on cybercrime & cybersecurity","isPartOf":{"@id":"https:\/\/premium-speakers.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg","datePublished":"2025-12-08T08:25:02+00:00","dateModified":"2026-03-17T14:26:26+00:00","description":"The best speakers on cyber security, cyber crime and hacker attacks. Book speakers on cyber crime, IT security and data protection now.","breadcrumb":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#primaryimage","url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/11\/cyberk1.jpg","width":2048,"height":1152,"caption":"Keynote Speakers on cybercrime and cybersecurity - Premium Speakers"},{"@type":"BreadcrumbList","@id":"https:\/\/premium-speakers.com\/en\/magazin\/the-most-knowledgeable-speakers-on-cybercrime-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/premium-speakers.com\/en\/"},{"@type":"ListItem","position":2,"name":"The most knowledgeable speakers on cybercrime and cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/premium-speakers.com\/en\/#website","url":"https:\/\/premium-speakers.com\/en\/","name":"Premium Speakers","description":"Agentur f\u00fcr Referenten Vermittlung","publisher":{"@id":"https:\/\/premium-speakers.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/premium-speakers.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/premium-speakers.com\/en\/#organization","name":"Premium Speakers","url":"https:\/\/premium-speakers.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png","width":1534,"height":722,"caption":"Premium Speakers"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PremiumSpeakers","https:\/\/x.com\/PremiumSpeakers","https:\/\/www.instagram.com\/premium_speakers\/","https:\/\/www.linkedin.com\/company\/premium-speakers","https:\/\/www.youtube.com\/channel\/UCrb9-cJEYUpbyi6KMAmZlCQ"]},{"@type":"Person","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146","name":"Mandy Weinand","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg","caption":"Mandy Weinand"}}]}},"_links":{"self":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts\/117813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/comments?post=117813"}],"version-history":[{"count":0,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts\/117813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/media\/117809"}],"wp:attachment":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/media?parent=117813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/categories?post=117813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/tags?post=117813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}