[{"data":1,"prerenderedAt":407},["Reactive",2],{"menuQuery_fr":3,"settingsQuery_fr":190,"routerQuery_/track-hacker_fr":196,"viewQuery_3457_FR":381},{"data":4,"loading":188,"networkStatus":189},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":121,"footer_menu_external_links":142,"footer_menu_meta":170},{"__typename":6,"name":7,"items":8},"Menu","Navigation principale",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Compétences",{"__typename":13,"path":14},"Url","/fr/competences",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cybersécurité",{"__typename":13,"path":19},"/fr/competences/cyber-securite",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/fr/node/219",[],{"__typename":10,"title":27,"url":28,"children":30},"Service juridique et acquisitions",{"__typename":13,"path":29},"/fr/competences/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/fr/competences/identite-numerique",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/fr/competences/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Réseau de la recherche",{"__typename":13,"path":44},"/fr/competences/reseau-de-recherche",[],{"__typename":10,"title":47,"url":48,"children":50},"Solutions",{"__typename":13,"path":49},"/fr/solutions",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/fr/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communities",{"__typename":13,"path":59},"/fr/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/fr/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"À propos de nous",{"__typename":13,"path":69},"/fr/propos-de-nous",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Notre fondation",{"__typename":13,"path":74},"/fr/about/notre-fondation",[],{"__typename":10,"title":77,"url":78,"children":80},"Politique de l'enseignement superieur",{"__typename":13,"path":79},"/fr/politique-de-l-enseignement-superieur",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovations",{"__typename":13,"path":84},"/fr/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Collaborations",{"__typename":13,"path":89},"/fr/Collaborations-mise",[],{"__typename":10,"title":92,"url":93,"children":95},"Emplois",{"__typename":13,"path":94},"/fr/emplois",[],{"__typename":10,"title":97,"url":98,"children":100},"Contactez-nous",{"__typename":13,"path":99},"/fr/contact",[],{"__typename":6,"name":102,"items":103},"Footer Column 1",[104,107,111,115,118],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":108,"url":109,"children":110},"Services cloud",{"__typename":13,"path":24},[],{"__typename":10,"title":112,"url":113,"children":114},"Identité numérique",{"__typename":13,"path":34},[],{"__typename":10,"title":27,"url":116,"children":117},{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":119,"children":120},{"__typename":13,"path":39},[],{"__typename":6,"name":122,"items":123},"Footer Column 2",[124,127,130,133,137],{"__typename":10,"title":42,"url":125,"children":126},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":128,"children":129},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":131,"children":132},{"__typename":13,"path":64},[],{"__typename":10,"title":134,"url":135,"children":136}," A propos de nous",{"__typename":13,"path":74},[],{"__typename":10,"title":138,"url":139,"children":141},"Newsletter",{"__typename":13,"path":140},"/fr/newsletter",[],{"__typename":6,"name":143,"items":144},"Footer Column 3 (External Links)",[145,150,155,160,165],{"__typename":10,"title":146,"url":147,"children":149},"nic.ch",{"__typename":13,"path":148},"https://www.nic.ch/",[],{"__typename":10,"title":151,"url":152,"children":154},"nic.li",{"__typename":13,"path":153},"https://www.nic.li/",[],{"__typename":10,"title":156,"url":157,"children":159},"eduid.ch",{"__typename":13,"path":158},"https://eduid.ch/",[],{"__typename":10,"title":161,"url":162,"children":164},"eduhub.ch",{"__typename":13,"path":163},"https://www.eduhub.ch/",[],{"__typename":10,"title":166,"url":167,"children":169},"Community Portal",{"__typename":13,"path":168},"https://portal.switch.ch/",[],{"__typename":6,"name":171,"items":172},"Copyright",[173,178,183],{"__typename":10,"title":174,"url":175,"children":177},"Juridique",{"__typename":13,"path":176},"/fr/juridique",[],{"__typename":10,"title":179,"url":180,"children":182},"Mentions légales",{"__typename":13,"path":181},"/fr/mentions-legales",[],{"__typename":10,"title":184,"url":185,"children":187},"Protection et sécurité des données",{"__typename":13,"path":186},"/fr/protection-des-donnees",[],false,7,{"data":191,"loading":188,"networkStatus":189},{"settings":192},{"__typename":193,"site_name":194,"slogan":195},"SiteSettings","Switch","",{"data":197,"loading":188,"networkStatus":189},{"router":198},{"__typename":199,"entity":200},"EntityResponse",{"__typename":201,"_id":202,"nid":203,"title":204,"langcode":205,"alternates":206,"breadcrumb":220,"seo_information":221,"content_elements":225,"lead":379,"background_color":380,"teaser_title":204,"teaser_subtitle":220,"teaser_text":379},"DetailPage","deba7788-1dea-4c16-b8db-a058d3ad5da3",498,"Track The Hacker ","fr",[207,211,214,217],{"__typename":208,"language_id":209,"url":210},"AlternatePathItem","EN","/en/track-hacker",{"__typename":208,"language_id":212,"url":213},"DE","/de/track-hacker",{"__typename":208,"language_id":215,"url":216},"IT","/it/track-hacker",{"__typename":208,"language_id":218,"url":219},"FR","/fr/track-hacker",null,{"__typename":222,"meta_description":223,"meta_name_robots":195,"canonical":219,"page_title":224,"keywords":195,"hreflang":205},"SeoInformation","Suivez et remontez les traces numériques Alerte de sécurité ! Un hacker criminel s’est introduit discrètement dans vos locaux et a dérobé des données critiques de votre organisation. Il est désormais en fuite et tente de les vendre. Saurez-vous suivre ses traces numériques et le retrouver ?","Track The Hacker | Switch",[226,247,271,277,300,310],{"__typename":227,"_id":228,"paragraph_id":229,"title":230,"intro":231,"fact_list_type":232,"facts":233},"FactsList","4efc5815-13ec-41c7-ace7-45ffe7230e9d",3452,"l’outdoor quest","\u003Cp>Êtes-vous prêt pour cette aventure hacker en plein air ? Prenez votre veste ! La mission de votre équipe consiste à récupérer les données volées auprès du hacker ou au point de remise avant qu’elles ne soient vendues. Suivez les indices, explorez des lieux cachés à Zurich et apprenez à naviguer en ligne de manière plus sûre, le tout de façon ludique.\u003C/p>\u003Cp>En équipe de jusqu’à 6 personnes, vous devrez tenter de localiser le hacker en suivant ses traces numériques.\u003Cbr>&nbsp;\u003C/p>","icon",[234,239,243],{"__typename":235,"id":236,"title":237,"text":220,"icon_name":238,"image":220,"link":220},"Fact",3449,"6 joueurs","users-gear",{"__typename":235,"id":240,"title":241,"text":220,"icon_name":242,"image":220,"link":220},3450,"2 à 3 heures","hourglass-clock",{"__typename":235,"id":244,"title":245,"text":220,"icon_name":246,"image":220,"link":220},3451,"Une mission","person-to-door",{"__typename":248,"_id":249,"paragraph_id":250,"title":220,"items":251},"ImageTextList","8791d999-8c3a-462a-b0a5-3871a904f31c",3525,[252],{"__typename":253,"id":254,"_id":255,"title":256,"text":257,"cta":220,"cta_style":258,"image":259},"ImageTextItem",3524,"9ca2a2bd-edf3-4c83-a657-3f1555a614c1","Objectifs de formation","\u003Cp>Cette aventure vise à sensibiliser les participants à l’importance de la confidentialité et de la sécurité des données, ainsi qu’aux risques posés par les tactiques d’ingénierie sociale. Le jeu démontre l’importance de protéger les informations personnelles et sensibles contre l’accès ou la divulgation non autorisés. participants on.\u003C/p>\u003Cp>&nbsp;\u003C/p>","primary",{"__typename":260,"src":261,"sources":262,"width":267,"height":268,"alt":269,"type":270,"caption":220},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=z-GEx8Io",[263],{"__typename":264,"src":265,"media":220,"sizes":266},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=z-GEx8Io 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=-fztLET3 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=V383pLsx 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/cert-rosenkoffer-street-00108-mitscreen-2.jpg?itok=EcHWhmO3 1230w","(min-width: 984px) 51vw, 95vw",1500,900,"hucs track the hacker","image/jpeg",{"__typename":272,"_id":273,"paragraph_id":274,"title":275,"text":276},"TextItem","f06a8cca-6e86-41c2-8643-1f20647f90e4",3453,"Vos données ont de la valeur","\u003Cp>Toute une industrie s’est développée autour du commerce de données volées. Les experts estiment que ce marché génère environ 160 milliards de dollars américains. La protection des données devient de plus en plus complexe. Parallèlement, nous produisons davantage de données que jamais, notamment via les réseaux sociaux, les applications, les montres connectées ou les objets domestiques intelligents.\u003C/p>\u003Cp>En 2019, des chercheurs ont découvert sur le dark web « Collection#1 », contenant 774 millions d’adresses e-mail et 21 millions de mots de passe proposés à la vente.\u003Cbr>&nbsp;\u003C/p>",{"__typename":278,"_id":279,"paragraph_id":280,"title":281,"attributes":282,"video_url":299},"VideoEmbed","989e273b-c1eb-4142-8bf3-9d4e1887ce66",3454,"Track The Hacker – une aventure de sécurité par Switch",[283,287,289,291,293,295,297],{"__typename":284,"name":285,"value":286},"VideoEmbedAttribute","download","1",{"__typename":284,"name":288,"value":286},"forms",{"__typename":284,"name":290,"value":286},"allow-same-origin",{"__typename":284,"name":292,"value":286},"scripts",{"__typename":284,"name":294,"value":286},"allow-top-navigation",{"__typename":284,"name":296,"value":286},"allowfullscreen",{"__typename":284,"name":298,"value":286},"autoplay","https://switch.mediaspace.cast.switch.ch/embed/secure/iframe/entryId/0_i4r3mf9c/uiConfId/23449074/st/0",{"__typename":301,"_id":302,"paragraph_id":303,"title":304,"contact_boxes":305},"ContactBoxList","3703a5fb-a21a-401b-a2ef-317192c00f0e",3456,"Des questions ?",[306],{"__typename":307,"name":308,"image":220,"phone_number":220,"e_mail_address":309,"job_title":220,"organisation":220},"ContactBox","Human Centred Security Team","hucs@switch.ch",{"__typename":311,"_id":312,"paragraph_id":313,"title":52,"langcode":218,"preseselected_field_event_type_target_id":314,"preseselected_field_topics_target_id":322,"next_events":326,"events_overview_page":369},"NextEvents","fe3cda52-ed62-4e99-93d1-f024db3993d1",3457,[315,319],{"__typename":316,"id":317,"name":318},"TaxonomyTerm",23,"Community Event",{"__typename":316,"id":320,"name":321},24,"Public Event",[323],{"__typename":316,"id":324,"name":325},9,"Cyber Security",{"__typename":327,"display_id":328,"view_id":329,"available_exposed_filters":330,"available_contextual_filters":363,"pager":364},"View","next_events","events_overview",[331,355],{"__typename":332,"field_name":333,"filter_label":334,"options":335},"ViewsExposedFilter","field_topics_target_id","Topic",[336,339,342,345,347,349,352],{"__typename":337,"id":338,"label":325},"ViewsExposedFilterOptions","9",{"__typename":337,"id":340,"label":341},"10","Cloud Services & Video",{"__typename":337,"id":343,"label":344},"13","Legal & Procurement",{"__typename":337,"id":346,"label":32},"11",{"__typename":337,"id":348,"label":37},"15",{"__typename":337,"id":350,"label":351},"12","Research Network",{"__typename":337,"id":353,"label":354},"16","eduhub",{"__typename":332,"field_name":356,"filter_label":357,"options":358},"field_event_type_target_id","Event Type",[359,361],{"__typename":337,"id":360,"label":318},"23",{"__typename":337,"id":362,"label":321},"24","langcode,excluded_nid",{"__typename":365,"pager_type":366,"total_pages":367,"items_per_page":368},"ViewsPager","full",2,3,{"__typename":370,"alternates":371},"LandingPage",[372,374,376,378],{"__typename":208,"language_id":209,"url":373},"/en/events",{"__typename":208,"language_id":212,"url":375},"/de/events",{"__typename":208,"language_id":215,"url":377},"/it/node/215",{"__typename":208,"language_id":218,"url":54},"Suivez et remontez les traces numériques\r\n\r\nAlerte de sécurité ! Un hacker criminel s’est introduit discrètement dans vos locaux et a dérobé des données critiques de votre organisation. Il est désormais en fuite et tente de les vendre. Saurez-vous suivre ses traces numériques et le retrouver ?","blue-purple",{"data":382,"loading":188,"networkStatus":189},{"view":383},{"__typename":327,"view_id":329,"field_settings":220,"result_count":367,"pager":384,"result":386},{"__typename":365,"items_per_page":368,"pager_type":366,"total_pages":385},1,[387,398],{"__typename":388,"nid":389,"title":390,"teaser_text":391,"url":392,"teaser_title":390,"infos_date":393,"infos_location":397,"teaser_subtitle":220},"EventDetailPage",503,"Human Centred Security Day 2026","Lors du Human Centred Security Day de Switch, nous abordons les défis actuels de la cybersécurité sous un angle pratique.\r\n\r\nL’accent est mis sur la facilitation de comportements sûrs au quotidien, avec des éclairages sur le risque humain, les menaces liées à l’IA et la culture de sécurité, ainsi que des échanges entre pairs.","/fr/human-centred-security-day-2026",{"__typename":394,"date_range":395,"time_range":396},"DateRangeItem","22. oct 2026","8:30–17:30","Zentrum Paul Klee, Monument im Fruchtland 3, 3006 Bern",{"__typename":388,"nid":399,"title":400,"teaser_text":401,"url":402,"teaser_title":400,"infos_date":403,"infos_location":406,"teaser_subtitle":220},505,"ICT Focus 2026","L’événement ICT Focus réunit des décideuses et décideurs des domaines de l’éducation, de la recherche et de l’innovation dans toute la Suisse, ainsi que des membres des organes de direction de Switch, y compris le Conseil de fondation et le comité.\r\nL’événement s’adresse traditionnellement aux cadres des départements informatiques et des services des hautes écoles et des institutions de recherche suisses.\r\nICT Focus – Connecter les esprits. Façonner l’avenir.","/fr/ict-focus-2026",{"__typename":394,"date_range":404,"time_range":405},"25. nov 2026","8:30–14:30","Verkehrshaus Luzern ",1776427013977]