[{"data":1,"prerenderedAt":285},["Reactive",2],{"menuQuery_en":3,"settingsQuery_en":188,"routerQuery_/piece-cake_en":194},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Competencies",{"__typename":13,"path":14},"Url","/en/competencies",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/en/competencies/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/en/competencies/cloud",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/en/competencies/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/en/competencies/digital-identity",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/en/competencies/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/en/competencies/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"Solutions",{"__typename":13,"path":49},"/en/solutions",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/en/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communities",{"__typename":13,"path":59},"/en/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/en/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"About us",{"__typename":13,"path":69},"/en/about-us",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Our foundation",{"__typename":13,"path":74},"/en/about/our-foundation",[],{"__typename":10,"title":77,"url":78,"children":80},"Higher education policy",{"__typename":13,"path":79},"/en/higher-education-policy",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovation",{"__typename":13,"path":84},"/en/about/innovation",[],{"__typename":10,"title":87,"url":88,"children":90},"Collaborations ",{"__typename":13,"path":89},"/en/Collaborations-international",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/en/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Contact us",{"__typename":13,"path":99},"/en/contact-us",[],{"__typename":6,"name":102,"items":103},"Footer Column 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Column 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/en/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Column 3 (External Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Data protection",{"__typename":13,"path":174},"/en/data-protection",[],{"__typename":10,"title":177,"url":178,"children":180},"Imprint",{"__typename":13,"path":179},"/en/imprint",[],{"__typename":10,"title":182,"url":183,"children":185},"Legal notice",{"__typename":13,"path":184},"/en/legal-notice",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","Switch","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":221,"background_color":284,"teaser_title":202,"teaser_subtitle":218,"teaser_text":221},"DetailPage","585c6645-a2cf-4280-8533-1204b53641b4",509,"Piece of Cake","en",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/piece-cake",{"__typename":206,"language_id":210,"url":211},"DE","/de/piece-cake",{"__typename":206,"language_id":213,"url":214},"IT","/it/piece-cake",{"__typename":206,"language_id":216,"url":217},"FR","/fr/piece-cake",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":208,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Gather information. Sneak in. And earn your slice of cake.","Piece of Cake | Switch",[224,245,268,274],{"__typename":225,"_id":226,"paragraph_id":227,"title":228,"intro":229,"fact_list_type":230,"facts":231},"FactsList","dde5ffaa-963e-4802-9082-f9d4e46f7cdc",3546,"The role play","\u003Cp>Sneak into your rival's premises!\u003Cbr>Oh no! The secret recipe for your famous cake has been stolen! Without this recipe, your bakery is doomed. Only your biggest rival could be behind such a malicious act. Can you retrieve the recipe before it's too late?\u003C/p>\u003Cp>Are you ready to sneak in without being noticed? Your team's mission is to find and steal back the stolen recipe. Step into your role and persuade or manipulate your opponent until they lead you to your most valuable asset.\u003C/p>\u003Cp>Together with up to 5 players, you will need to find the recipe’s location using social engineering techniques.\u003C/p>","icon",[232,237,241],{"__typename":233,"id":234,"title":235,"text":218,"icon_name":236,"image":218,"link":218},"Fact",3543,"5 players","users-gear",{"__typename":233,"id":238,"title":239,"text":218,"icon_name":240,"image":218,"link":218},3544,"2 hours","alarm-clock",{"__typename":233,"id":242,"title":243,"text":218,"icon_name":244,"image":218,"link":218},3545,"1 mission","trophy",{"__typename":246,"_id":247,"paragraph_id":248,"title":218,"items":249},"ImageTextList","de3eeb56-6502-404a-8595-90faf9abb312",3548,[250],{"__typename":251,"id":252,"_id":253,"title":254,"text":255,"cta":218,"cta_style":256,"image":257},"ImageTextItem",3547,"6f978b6f-98b5-43ba-8b9f-52c0cd986755","Learning objectives","\u003Cp>The aim of this adventure is to educate participants on the importance of data protection and information security, as well as the risks of social engineering tactics.The game highlights how crucial it is to protect personal and sensitive information from unauthorised access or disclosure. Additionally, participants will gain insight into psychological manipulation and deception used in social engineering attacks to trick victims into divulging sensitive information.\u003C/p>","primary",{"__typename":258,"src":259,"sources":260,"width":265,"height":266,"alt":202,"type":267,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-04/piece-of-cake.jpg?itok=WX7G-6_m",[261],{"__typename":262,"src":263,"media":218,"sizes":264},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-04/piece-of-cake.jpg?itok=WX7G-6_m 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-04/piece-of-cake.jpg?itok=RUbN32zo 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-04/piece-of-cake.jpg?itok=G8s89-UC 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-04/piece-of-cake.jpg?itok=cssIarvN 1230w","(min-width: 984px) 51vw, 95vw",3567,2480,"image/jpeg",{"__typename":269,"_id":270,"paragraph_id":271,"title":272,"text":273},"TextItem","42e4b674-fee7-4815-9dc5-321f19ec65a0",3549,"It’s about hacking people","\u003Cp>Criminal hackers have long realised that it can be easier to hack people than to breach highly secured computer systems. Phishing, CEO fraud, or investment scams are just a few examples of attacks that utilise social engineering techniques to manipulate people into giving up information or money.\u003Cbr>Social engineering is the psychological manipulation of individuals aimed at influencing specific behaviours or obtaining confidential information. Unlike traditional «fraud», social engineering is often just one step in a much more complex scheme. (wikipedia.org)\u003C/p>",{"__typename":275,"_id":276,"paragraph_id":277,"title":278,"contact_boxes":279},"ContactBoxList","bfb49bfc-1666-41c9-936c-99b6867705c0",3551,"Any questions?",[280],{"__typename":281,"name":282,"image":218,"phone_number":218,"e_mail_address":283,"job_title":218,"organisation":218},"ContactBox","Human Centred Security Team","hucs@switch.ch","blue-purple",1776351106247]