[{"data":1,"prerenderedAt":344},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/security-engagement-kit_de":194},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"Lösungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Über uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","Switch","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":221,"background_color":343,"teaser_title":202,"teaser_subtitle":218,"teaser_text":221},"DetailPage","42034182-756a-4340-8353-d195380ffcab",506,"Security Engagement Kit","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/security-engagement-kit",{"__typename":206,"language_id":210,"url":211},"DE","/de/security-engagement-kit",{"__typename":206,"language_id":213,"url":214},"IT","/it/security-engagement-kit",{"__typename":206,"language_id":216,"url":217},"FR","/fr/security-engagement-kit",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":211,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Mitarbeitende für Sicherheit sensibilisieren und aktiv einbinden? Das Security Engagement Kit ist genau dafür konzipiert. Wissenschaftlich fundiert. Anpassbar. Begleitet durch Expertinnen und Experten von der ersten Analyse bis zur regelmässigen Evaluation.","Security Engagement Kit | Switch",[224,229,263,286,291],{"__typename":225,"_id":226,"paragraph_id":227,"title":218,"text":228},"TextItem","f80695f0-ad86-4c4b-ac6a-f903c391c35a",3498,"\u003Cp>Das \u003Cstrong>Security Engagement Kit\u003C/strong> ist ein massgeschneidertes, sofort einsetzbares und wissenschaftlich fundiertes Programm, das Komplexität reduziert und nachhaltige Verhaltensänderungen fördert. Es fokussiert auf zentrale Verhaltensweisen und vermittelt Mitarbeitenden die notwendigen Kompetenzen, also Wissen und Fähigkeiten, die passenden Rahmenbedingungen wie Tools und Prozesse sowie die Motivation, diese im Arbeitsalltag und im privaten Umfeld anzuwenden. Dadurch werden Menschen befähigt, sich aktiv mit digitaler Sicherheit auseinanderzusetzen.\u003C/p>\u003Cp>Im Unterschied zu isolierten E-Learning Plattformen oder umfangreichen Beratungsprojekten verbindet das Security Engagement Kit die Einfachheit von E-Learning Angeboten mit der Wirksamkeit von mehrkanaligen Kommunikationsmassnahmen. Es bietet ein wirkungsvolles und planbares Leistungsportfolio, das es Verantwortlichen im Bereich Sicherheit ermöglicht, sich auf ihre Kernaufgaben zu konzentrieren.\u003Cbr>&nbsp;\u003C/p>",{"__typename":230,"_id":231,"paragraph_id":232,"title":233,"intro":234,"fact_list_type":235,"facts":236},"FactsList","9b3d0cfd-f88f-4198-94ad-407ebbf29ef0",3504,"Ein flexibles Programm, das sich an Ihren Bedürfnissen orientiert","\u003Cp>Unsere Lösung kombiniert fünf Bausteine mit einer Auswahl an individuell anpassbaren Modulen und wird über ein einfaches Abonnement bereitgestellt.\u003C/p>","icon",[237,243,248,253,258],{"__typename":238,"id":239,"title":240,"text":241,"icon_name":242,"image":218,"link":218},"Fact",3499,"I: Kick off","\u003Cp>Planen. Barrieren analysieren. Den Weg definieren.\u003C/p>","screen-users",{"__typename":238,"id":244,"title":245,"text":246,"icon_name":247,"image":218,"link":218},3500,"II: Informieren und schulen","\u003Cp>Vermitteln. Wissens- und Kompetenzlücken schliessen.\u003C/p>","scroll-old",{"__typename":238,"id":249,"title":250,"text":251,"icon_name":252,"image":218,"link":218},3501,"III: Security Adventures ","\u003Cp>Motivieren. Relevanz durch erlebnisorientierte Formate schaffen.\u003C/p>","roller-coaster",{"__typename":238,"id":254,"title":255,"text":256,"icon_name":257,"image":218,"link":218},3502,"IV: Tools und Prozesse","\u003Cp>Ermöglichen. Die passenden Strukturen und Voraussetzungen schaffen.\u003C/p>","toolbox",{"__typename":238,"id":259,"title":260,"text":261,"icon_name":262,"image":218,"link":218},3503,"V: Evaluation ","\u003Cp data-start=\"684\" data-end=\"743\">Evaluieren. Messen, was sich verändert hat.\u003C/p>","rocket-launch",{"__typename":264,"_id":265,"paragraph_id":266,"title":218,"items":267},"ImageTextList","470b10ab-c521-4ee2-8aaf-9016b27f32c0",3506,[268],{"__typename":269,"id":270,"_id":271,"title":272,"text":273,"cta":218,"cta_style":274,"image":275},"ImageTextItem",3505,"50d1d6f7-d442-401c-9739-a28202d3294b","Ein Abonnement.","\u003Cp>Durchgehende Unterstützung durch Expertinnen und Experten. Entwickelt für Sicherheitsverantwortliche, die Ergebnisse brauchen, nicht zusätzliche Programme, die verwaltet werden müssen.\u003C/p>","primary",{"__typename":276,"src":277,"sources":278,"width":283,"height":283,"alt":284,"type":285,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/adventures.jpg?itok=atgN-1ED",[279],{"__typename":280,"src":281,"media":218,"sizes":282},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/adventures.jpg?itok=atgN-1ED 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/adventures.jpg?itok=YS1DIlzO 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/adventures.jpg?itok=B8-4LxKh 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/adventures.jpg?itok=pywu76Fk 1230w","(min-width: 984px) 51vw, 95vw",600,"security engagement kit","image/jpeg",{"__typename":225,"_id":287,"paragraph_id":288,"title":289,"text":290},"2cd06956-d37e-45b7-a518-b4d098d28aae",3507,"Security Adventures – Lernen, wie Hacker denken","\u003Cp>Erreichen Sie nachhaltiges Engagement durch praxisnahe Security Erlebnisse: «Hack The Hacker» im Escape Room, «Track The Hacker» als Outdoor Quest, retten Sie Katzenvideos in unserer «Security Arcade» oder sichern Sie sich Ihr «Piece of Cake» in unserem Tabletop Rollenspiel.\u003C/p>\u003Cp>Mehr dazu hier: \u003Ca href=\"https://www.switch.ch/en/security-adventures\">\u003Cspan style=\"font-family:&quot;Euclid Circular B&quot;,sans-serif;\" lang=\"EN-GB\">Security Adventures\u003C/span>\u003C/a>\u003C/p>\u003Cp>\u003Cbr>Möchten Sie mehr erfahren? Unser Expertenteam ist für \u003Cstrong>Sie \u003C/strong>da!\u003C/p>",{"__typename":292,"_id":293,"paragraph_id":294,"title":295,"contact_boxes":296},"ContactBoxList","897c7d04-73c9-4c8a-83cc-0aafcd626c11",3515,"Noch Fragen?",[297,310,320,332],{"__typename":298,"name":299,"image":300,"phone_number":218,"e_mail_address":308,"job_title":309,"organisation":218},"ContactBox","Katja Dörlemann, PhD",{"__typename":276,"src":301,"sources":302,"width":283,"height":283,"alt":306,"type":307,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2025-09/katja_webb-1_1.png?itok=09sAvBcf",[303],{"__typename":280,"src":304,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2025-09/katja_webb-1_1.png?itok=76EUDSVb 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2025-09/katja_webb-1_1.png?itok=09sAvBcf 640w","100vw"," x","image/png","katja.doerlemann@switch.ch","Expert Human-Centred Security",{"__typename":298,"name":311,"image":312,"phone_number":218,"e_mail_address":319,"job_title":309,"organisation":218},"Cornelia Puhze ",{"__typename":276,"src":313,"sources":314,"width":317,"height":317,"alt":318,"type":285,"caption":318},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2024-08/cornelia-puhze-switch.jpg?itok=3pWyFm2f",[315],{"__typename":280,"src":316,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2024-08/cornelia-puhze-switch.jpg?itok=i_Z93KJr 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2024-08/cornelia-puhze-switch.jpg?itok=3pWyFm2f 640w",3730,"Cornelia Puhze, Security Awareness Specialist at Switch","cornelia.puhze@switch.ch",{"__typename":298,"name":321,"image":322,"phone_number":218,"e_mail_address":330,"job_title":331,"organisation":218},"Fabio Greiner ",{"__typename":276,"src":323,"sources":324,"width":327,"height":328,"alt":329,"type":285,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/website.jpg?itok=GGXIVwYC",[325],{"__typename":280,"src":326,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2026-03/website.jpg?itok=R7iT5ZGS 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/website.jpg?itok=GGXIVwYC 640w",4937,3840,"Fabio Greiner","Fabio.Greiner@switch.ch","Specialist Human-Centred Security",{"__typename":298,"name":333,"image":334,"phone_number":218,"e_mail_address":341,"job_title":342,"organisation":218},"Céline Neubig",{"__typename":276,"src":335,"sources":336,"width":339,"height":339,"alt":340,"type":285,"caption":218},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/celine.jpg?itok=iLy3FaOm",[337],{"__typename":280,"src":338,"media":218,"sizes":305},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2026-03/celine.jpg?itok=E2Mlklw1 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/celine.jpg?itok=iLy3FaOm 640w",400,"celine n","celine.neubig@switch.ch","Educational Game Design","purple-red",1776426948197]