{"id":40763,"date":"2024-08-16T09:14:21","date_gmt":"2024-08-16T15:14:21","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=40763"},"modified":"2026-03-09T02:24:21","modified_gmt":"2026-03-09T08:24:21","slug":"cyberrisk-tv-interview-mal-klartext-daruber-wo-ki-sicherheitsexperten-helfen-kann","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/","title":{"rendered":"CyberRisk TV-Interview: Seien wir ehrlich dar\u00fcber, wo KI die Sicherheitsoperationen unterst\u00fctzen kann."},"content":{"rendered":"<section class=\"bs-section bs-section-4b500e99ef8cdebaf3ddaa6a36e7fb461e386ddc bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-d4f201cab41f0341a7cbb32888b9ef9b39ce8318 bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Videos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">CyberRisk TV-Interview: Seien wir ehrlich dar\u00fcber, wo KI die Sicherheitsoperationen unterst\u00fctzen kann.<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">Seien Sie dabei, wenn Mike Lyborg, CISO von Swimlane, und Mandy Logan von SC Media die komplexe Thematik der generativen KI genauer unter die Lupe nehmen! Zwar ist generative KI ein nicht mehr ganz neues Trendthema, doch ist es auch nicht das erste Mal, dass die Cybersicherheitsbranche aufkommende Technologien einsetzt, die menschliche Handlungen imitieren k\u00f6nnen.<\/span><a href=\"https:\/\/swimlane.com\/de\/blog\/sicherheitsautomatisierung\/\"><span style=\"font-weight: 400;\">\u00a0<\/span><\/a><\/p>\n<p><a href=\"https:\/\/swimlane.com\/de\/blog\/sicherheitsautomatisierung\/\"><span style=\"font-weight: 400;\">Sicherheitsautomatisierung<\/span><\/a><span style=\"font-weight: 400;\"> Ihre F\u00e4higkeit, im Namen von Menschen zu handeln, hat den Weg f\u00fcr vertrauensw\u00fcrdige generative KI (im Rahmen des Vern\u00fcnftigen) geebnet. Die Konvergenz und Reife dieser Technologien bergen nun das Potenzial, die Funktionsweise von Sicherheitsoperationen grundlegend zu ver\u00e4ndern und gleichzeitig deren Leistungsf\u00e4higkeit zu vervielfachen. <\/span><a href=\"https:\/\/swimlane.com\/de\/blog\/rollen-und-verantwortlichkeiten-im-soc-team\/\"><span style=\"font-weight: 400;\">SOC-Teams.\u00a0<\/span><\/a><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"auto\" style=\"min-height:520px\" src=\"https:\/\/www.youtube.com\/embed\/howgipIUHtA?si=7on8xNBTjPSa9nBD\" title=\"YouTube-Videoplayer\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-aa6eb5dfda60c91b965e7c072905992179763573 bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Das k\u00f6nnte Sie auch interessieren<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-b43fa869b558d43fa93bdd41503b8820f2f54817 bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e9de1e09e92 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-Management-vs.-Patch-Management-Explained-Masthead.webp' class='img-fluid' alt='' title='Schwachstellenmanagement vs. Patch-Management erkl\u00e4rt \u2013 Titelseite'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Schwachstellenmanagement vs. Patch-Management \u2013 Erl\u00e4uterung<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e9de1e0b7e3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/reports\/tag-ai-secops-automation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/TAG-Cyber-Tech-Report.webp' class='img-fluid' alt='' title='TAG-Cyber-Tech-Report'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Bericht<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber Tech Report: Einsatz von KI f\u00fcr die SecOps-Automatisierung<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e9de1e0ce93 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/news\/artificial-intelligence-learning-algorithms-cybersecurity-innovations\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Black-Hat-AI-PR-OG-Image.jpg' class='img-fluid' alt='Eine US-Bundesbeh\u00f6rde spart 1.400 Millionen US-Dollar durch Swimlane-Sicherheitsautomatisierung. . ' title='Black Hat AI PR OG Image'   \/>\n                                <figcaption class='figure-caption'>Modernste KI-Lernalgorithmen treiben neue Innovationen im Bereich der KI-Cybersicherheit voran. <\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>Modernste KI-Lernalgorithmen treiben neue Innovationen im Bereich der Swimlane-KI-Cybersicherheit voran<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":40764,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":40764,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"2024-02-26 08:29:32","event_end_date":"2024-02-26 08:29:32","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[105],"resource-topic":[215,219],"resource-industry":[108,99],"blog-category":[],"class_list":["post-40763","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-videos","resource-topic-ai","resource-topic-company-culture","resource-industry-use-case","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Let\u2019s Get Real About Where AI can Help SecOps | Swimlane<\/title>\n<meta name=\"description\" content=\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/ressourcen\/videos\/ciso-wertanalyse-ki-secops-black-hat-interview\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps\" \/>\n<meta property=\"og:description\" content=\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/ressourcen\/videos\/ciso-wertanalyse-ki-secops-black-hat-interview\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T08:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams. %\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/\",\"name\":\"Let\u2019s Get Real About Where AI can Help SecOps | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/LyborgBlackhatInterview.png\",\"datePublished\":\"2024-08-16T15:14:21+00:00\",\"dateModified\":\"2026-03-09T08:24:21+00:00\",\"description\":\"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/LyborgBlackhatInterview.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/LyborgBlackhatInterview.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/ciso-value-ai-secops-black-hat-interview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seien wir ehrlich: Wo kann KI die Sicherheitsoperationen unterst\u00fctzen? | Swimlane","description":"Nehmen Sie an der Diskussion zwischen Mike Lyborg, CISO von Swimlane, und Mandy Logan von SC Media teil. Sie er\u00f6rtern Anwendungsf\u00e4lle f\u00fcr KI-gest\u00fctzte Automatisierung, die SOC-Teams zugutekommen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/ressourcen\/videos\/ciso-wertanalyse-ki-secops-black-hat-interview\/","og_locale":"de_DE","og_type":"article","og_title":"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps","og_description":"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams.","og_url":"https:\/\/swimlane.com\/de\/ressourcen\/videos\/ciso-wertanalyse-ki-secops-black-hat-interview\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-09T08:24:21+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Join Swimlane CISO, Mike Lyborg and SC Media\u2019s Mandy Logan as they discuss AI-enhanced automation use cases that benefit SOC teams. %","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/","url":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/","name":"Seien wir ehrlich: Wo kann KI die Sicherheitsoperationen unterst\u00fctzen? | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","datePublished":"2024-08-16T15:14:21+00:00","dateModified":"2026-03-09T08:24:21+00:00","description":"Nehmen Sie an der Diskussion zwischen Mike Lyborg, CISO von Swimlane, und Mandy Logan von SC Media teil. Sie er\u00f6rtern Anwendungsf\u00e4lle f\u00fcr KI-gest\u00fctzte Automatisierung, die SOC-Teams zugutekommen.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/LyborgBlackhatInterview.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/ciso-value-ai-secops-black-hat-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"CyberRisk TV Interview: Let\u2019s Get Real About Where AI can Help SecOps"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/40763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/40763\/revisions"}],"predecessor-version":[{"id":54777,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/40763\/revisions\/54777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/40764"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=40763"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=40763"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=40763"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=40763"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=40763"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=40763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}