{"id":54909,"date":"2020-11-04T10:14:56","date_gmt":"2020-11-04T09:14:56","guid":{"rendered":"https:\/\/premium-speakers.com\/magazin\/speaker-it-security-cybercrime-cybersecurity-en\/"},"modified":"2023-08-04T14:23:55","modified_gmt":"2023-08-04T12:23:55","slug":"speaker-it-security-cybercrime-cybersecurity","status":"publish","type":"post","link":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/","title":{"rendered":"Speaker IT Security, Cybercrime &amp; Cybersecurity"},"content":{"rendered":"<p>Speaker IT Security, Cybercrime &amp; Cybersecurity: Safe your Data! In a digital world we need digital security for us and our data. Confidentiality &#8211; Availability &#8211; Integrity are decisive elements for our information security.<\/p>\n<p>The protection of our data and information becomes more and more central in a digital world. In general, information security is the term used to describe the characteristics of information processing and storage systems. In the center: Confidentiality &#8211; Availability &#8211; Integrity. Modern life is inconceivable without the comprehensive digital infrastructures that we hardly notice in our everyday lives.<\/p>\n<p><strong>&#8220;As a result of a single successful cyber attack, a person could lose all data, critical infrastructures could stop working or even cause human loss. In my opinion, cyber security does not tolerate compromise&#8221;.<\/strong><br \/>\nYevgeni Kaspersky (former CEO of Kaspersky)<\/p>\n<h2>Topics of our speakers &amp; speakers on IT-Security<\/h2>\n<p>&#8211; Virtual Private Network &#8211; digital communication networks &amp; WE<br \/>\n&#8211; Information Security Management &#8211; where is my data still safe?<br \/>\n&#8211; Cyber war &#8211; the fight for our security<br \/>\n&#8211; Digitization &#8211; Data protection &#8211; Information storage<br \/>\n&#8211; A life between DSGVO &amp; digital freedom of movement<br \/>\n&#8211; Cybersecurity &#8211; a matter for the boss<br \/>\n&#8211; The Programmed Human Being &#8211; Perspectives of our Information Society<br \/>\n&#8211; The Internet Trap &#8211; Opportunities and Risks of Internet, Social Media and Big Data<br \/>\n&#8211; The Digital Revolution<\/p>\n<p>Both in private life and in business, digital protection against dangers and threats is becoming increasingly important in order to minimize damage and risks. For years, our technical innovations and the associated networking have been increasing the interdependencies between the online and offline worlds &#8211; and as a result, risk potential is also growing. IT security is therefore an elementary component of holistic security systems in which AI&#8217;s are becoming increasingly important.<\/p>\n<p>(Almost) everyone is moving digitally, but not everyone is really aware of the potential risks or understands what IT security is &#8211; we need digital education.<\/p>\n<h3>IT Security &#8211; our digital security<\/h3>\n<p>Our information and data are assets worth protecting. Access to them should therefore be restricted and controlled. Only those who really have access should be able to access it. In this context, Information Security Management Systems (=ISMS) are becoming increasingly relevant. They define procedures and rules that are intended to guarantee our operational information security in the long term.<\/p>\n<p><strong>&#8220;Encryption works. Properly implemented strong crypto systems are one of the few things you can rely on&#8221;.<\/strong><br \/>\nEdward Snowden (US-American Whistleblower &amp; former CIA employee)<\/p>\n<p>Sensitization and awareness of the situation: Digitization is developing our world and therefore we also need an understanding of data protection and security in the digital space &#8211; because both offline and online, our data must be secure. Now is the time when we need even greater awareness of our digital information security &#8211; and modern information technology and software can help us achieve this.<\/p>\n<p><strong>It&#8217;s time for IT Security!<\/strong><\/p>\n<p>Book speakers on IT Security, Cybersecurity &amp; Cybercrime with the speaker agency Premium Speakers. Top speakers like <a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/thomas-r-koehler\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Thomas K\u00f6hler<\/strong><\/a>, <a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/andreas-arnemann\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Andreas Arnemann<\/strong><\/a>, <a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/fil-team-red\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FIL TEAM RED<\/strong><\/a>, <a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/rainer-kessler\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Rainer Kessler<\/strong><\/a> and <a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/peter-hacker\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Peter Hacker<\/strong> <\/a>can be booked at Premium Speakers at any time.<\/p>\n<p>Call us or write a Mail to <a href=\"mailto:welcome@premium-speakers.com\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>welcome@premium-speakers.com<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speaker IT Security, Cybercrime &amp; Cybersecurity: Safe your Data! In a digital world we need digital security for us and [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":49950,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16563],"tags":[16489,16490,16494,16498],"class_list":["post-54909","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-topics","tag-redner-cybercrime","tag-redner-cybersecurity","tag-redner-it-security","tag-redner-netzsicherheit"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Speaker IT Security, Cybercrime &amp; Cybersecurity &#8211; Premium Speakers<\/title>\n<meta name=\"description\" content=\"Speaker IT Security, Cybercrime &amp; Cybersecurity are now available with The Premium Speakers Bureau. Book your keynote speaker now for your next event.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Speaker IT Security, Cybercrime &amp; Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Speaker IT Security, Cybercrime &amp; Cybersecurity are now available with The Premium Speakers Bureau. Book your keynote speaker now for your next event.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Premium Speakers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PremiumSpeakers\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-04T09:14:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-04T12:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"420\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Oliver Stoldt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PremiumSpeakers\" \/>\n<meta name=\"twitter:site\" content=\"@PremiumSpeakers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oliver Stoldt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\"},\"author\":{\"name\":\"Oliver Stoldt\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/7c89a4f749d4f533a440df84d4acaedd\"},\"headline\":\"Speaker IT Security, Cybercrime &amp; Cybersecurity\",\"datePublished\":\"2020-11-04T09:14:56+00:00\",\"dateModified\":\"2023-08-04T12:23:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\"},\"wordCount\":542,\"publisher\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg\",\"keywords\":[\"Redner Cybercrime\",\"Redner Cybersecurity\",\"Redner IT-Security\",\"Redner Netzsicherheit\"],\"articleSection\":[\"Blog about Categories \/ Topics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\",\"url\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\",\"name\":\"Speaker IT Security, Cybercrime &amp; Cybersecurity &#8211; Premium Speakers\",\"isPartOf\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg\",\"datePublished\":\"2020-11-04T09:14:56+00:00\",\"dateModified\":\"2023-08-04T12:23:55+00:00\",\"description\":\"Speaker IT Security, Cybercrime & Cybersecurity are now available with The Premium Speakers Bureau. Book your keynote speaker now for your next event.\",\"breadcrumb\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg\",\"width\":420,\"height\":420,\"caption\":\"Speaker IT-Security - Cybercrime - Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/premium-speakers.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Speaker IT Security, Cybercrime &amp; Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#website\",\"url\":\"https:\/\/premium-speakers.com\/en\/\",\"name\":\"Premium Speakers\",\"description\":\"Agentur f\u00fcr Referenten Vermittlung\",\"publisher\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/premium-speakers.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\",\"name\":\"Premium Speakers\",\"url\":\"https:\/\/premium-speakers.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png\",\"width\":1534,\"height\":722,\"caption\":\"Premium Speakers\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PremiumSpeakers\",\"https:\/\/x.com\/PremiumSpeakers\",\"https:\/\/www.instagram.com\/premium_speakers\/\",\"https:\/\/www.linkedin.com\/company\/premium-speakers\",\"https:\/\/www.youtube.com\/channel\/UCrb9-cJEYUpbyi6KMAmZlCQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/7c89a4f749d4f533a440df84d4acaedd\",\"name\":\"Oliver Stoldt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/34c\/34c8a7311cc3115569c59e1df40fe27fx96.jpg\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/34c\/34c8a7311cc3115569c59e1df40fe27fx96.jpg\",\"caption\":\"Oliver Stoldt\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Speaker IT Security, Cybercrime &amp; Cybersecurity &#8211; Premium Speakers","description":"Speaker IT Security, Cybercrime & Cybersecurity are now available with The Premium Speakers Bureau. Book your keynote speaker now for your next event.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Speaker IT Security, Cybercrime &amp; Cybersecurity","og_description":"Speaker IT Security, Cybercrime & Cybersecurity are now available with The Premium Speakers Bureau. Book your keynote speaker now for your next event.","og_url":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/","og_site_name":"Premium Speakers","article_publisher":"https:\/\/www.facebook.com\/PremiumSpeakers","article_published_time":"2020-11-04T09:14:56+00:00","article_modified_time":"2023-08-04T12:23:55+00:00","og_image":[{"width":420,"height":420,"url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg","type":"image\/jpeg"}],"author":"Oliver Stoldt","twitter_card":"summary_large_image","twitter_creator":"@PremiumSpeakers","twitter_site":"@PremiumSpeakers","twitter_misc":{"Written by":"Oliver Stoldt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/"},"author":{"name":"Oliver Stoldt","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/7c89a4f749d4f533a440df84d4acaedd"},"headline":"Speaker IT Security, Cybercrime &amp; Cybersecurity","datePublished":"2020-11-04T09:14:56+00:00","dateModified":"2023-08-04T12:23:55+00:00","mainEntityOfPage":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/"},"wordCount":542,"publisher":{"@id":"https:\/\/premium-speakers.com\/en\/#organization"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg","keywords":["Redner Cybercrime","Redner Cybersecurity","Redner IT-Security","Redner Netzsicherheit"],"articleSection":["Blog about Categories \/ Topics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/","url":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/","name":"Speaker IT Security, Cybercrime &amp; Cybersecurity &#8211; Premium Speakers","isPartOf":{"@id":"https:\/\/premium-speakers.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg","datePublished":"2020-11-04T09:14:56+00:00","dateModified":"2023-08-04T12:23:55+00:00","description":"Speaker IT Security, Cybercrime & Cybersecurity are now available with The Premium Speakers Bureau. Book your keynote speaker now for your next event.","breadcrumb":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#primaryimage","url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2020\/11\/referent-it-security-cybercrime-cybersecurity-premium-speakers-420.jpg","width":420,"height":420,"caption":"Speaker IT-Security - Cybercrime - Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/premium-speakers.com\/en\/magazin\/speaker-it-security-cybercrime-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/premium-speakers.com\/en\/"},{"@type":"ListItem","position":2,"name":"Speaker IT Security, Cybercrime &amp; Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/premium-speakers.com\/en\/#website","url":"https:\/\/premium-speakers.com\/en\/","name":"Premium Speakers","description":"Agentur f\u00fcr Referenten Vermittlung","publisher":{"@id":"https:\/\/premium-speakers.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/premium-speakers.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/premium-speakers.com\/en\/#organization","name":"Premium Speakers","url":"https:\/\/premium-speakers.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png","width":1534,"height":722,"caption":"Premium Speakers"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PremiumSpeakers","https:\/\/x.com\/PremiumSpeakers","https:\/\/www.instagram.com\/premium_speakers\/","https:\/\/www.linkedin.com\/company\/premium-speakers","https:\/\/www.youtube.com\/channel\/UCrb9-cJEYUpbyi6KMAmZlCQ"]},{"@type":"Person","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/7c89a4f749d4f533a440df84d4acaedd","name":"Oliver Stoldt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/34c\/34c8a7311cc3115569c59e1df40fe27fx96.jpg","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/34c\/34c8a7311cc3115569c59e1df40fe27fx96.jpg","caption":"Oliver Stoldt"}}]}},"_links":{"self":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts\/54909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/comments?post=54909"}],"version-history":[{"count":0,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts\/54909\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/media\/49950"}],"wp:attachment":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/media?parent=54909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/categories?post=54909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/tags?post=54909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}