{"guid":"80b82f3a-0753-5fa7-be97-144bf2007aac","title":"Öffentliche Sicherheit vs. IT-Sicherheit","subtitle":null,"slug":"15np-5-oeffentliche_sicherheit_vs_it_sicherheit","link":"https://c3voc.de","description":"Staatstrojaner und Hackback oder Verschlüsselung und Anonymität? Die IT-Sicherheitspolitik des Bundesinnenministeriums befindet sich im Spannungsfeld zwischen öffentlicher Sicherheit und Informationssicherheit. Abteilungsleiter Andreas Könen verantwortet im BMI Gesetzentwürfe wie das IT-Sicherheitsgesetz 2.0 und wirkt an Änderungen etwa des Verfassungsschutzgesetzes mit, Andre veröffentlicht die Gesetzentwürfe. Jetzt debattieren sie öffentlich.","original_language":"deu","persons":["Andreas Könen \u0026 Andre Meister"],"view_count":388,"promoted":false,"date":"2019-09-13T00:00:00.000+02:00","release_date":"2019-09-18T02:00:00.000+02:00","updated_at":"2025-12-12T04:45:02.807+01:00","tags":["15np","5","2019"],"length":1433,"duration":1433,"thumb_url":"https://static.media.ccc.de/media/events/netzpolitik/15np/5-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/netzpolitik/15np/5-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/netzpolitik/15np/5-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/netzpolitik/15np/5-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/15np-5-oeffentliche_sicherheit_vs_it_sicherheit","url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_title":"Das ist Netzpolitik! #15np","conference_url":"https://api.media.ccc.de/public/conferences/15np","related":[{"event_id":7846,"event_guid":"dc8b3e8c-0831-5725-a64a-2c8cd7737580","weight":55},{"event_id":7847,"event_guid":"bf3e6d3e-17cd-51a6-a065-d6a2fdb35234","weight":29},{"event_id":7852,"event_guid":"d072ee6e-134c-56c7-9033-c9f67fb64f4a","weight":34},{"event_id":7854,"event_guid":"8e38e349-ac1f-5b52-b715-5100d80dade4","weight":20},{"event_id":7856,"event_guid":"d7c44ea4-ca2c-51d1-b5b1-87aa7c6a1253","weight":24},{"event_id":7857,"event_guid":"9baa0eba-3465-5f4e-b83c-60b76cdd7960","weight":11},{"event_id":7859,"event_guid":"8ab644b9-3d7c-5897-8b03-2307f82235dc","weight":11},{"event_id":7860,"event_guid":"92629b4f-34f7-592e-b580-4aa133e6e890","weight":19},{"event_id":7862,"event_guid":"b96f6ea5-4853-53ac-97bb-97a53e3c73d3","weight":14}],"recordings":[{"size":417,"length":1433,"mime_type":"video/mp4","language":"deu","filename":"15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-09-18T23:35:03.297+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/15np/h264-hd/15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_hd.mp4","url":"https://api.media.ccc.de/public/recordings/40205","event_url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_url":"https://api.media.ccc.de/public/conferences/15np"},{"size":21,"length":1428,"mime_type":"audio/mpeg","language":"deu","filename":"15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2019-09-18T23:47:40.156+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/15np/mp3/15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/40208","event_url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_url":"https://api.media.ccc.de/public/conferences/15np"},{"size":112,"length":1433,"mime_type":"video/mp4","language":"deu","filename":"15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-09-18T23:48:06.282+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/15np/h264-sd/15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_sd.mp4","url":"https://api.media.ccc.de/public/recordings/40209","event_url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_url":"https://api.media.ccc.de/public/conferences/15np"},{"size":13,"length":1428,"mime_type":"audio/opus","language":"deu","filename":"15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2019-09-18T23:48:36.692+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/15np/opus/15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_opus.opus","url":"https://api.media.ccc.de/public/recordings/40210","event_url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_url":"https://api.media.ccc.de/public/conferences/15np"},{"size":192,"length":1433,"mime_type":"video/webm","language":"deu","filename":"15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-09-19T00:10:35.359+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/15np/webm-sd/15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/40232","event_url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_url":"https://api.media.ccc.de/public/conferences/15np"},{"size":626,"length":1433,"mime_type":"video/webm","language":"deu","filename":"15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-09-19T00:11:21.762+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/15np/webm-hd/15np-5-deu-Oeffentliche_Sicherheit_vs_IT-Sicherheit_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/40233","event_url":"https://api.media.ccc.de/public/events/80b82f3a-0753-5fa7-be97-144bf2007aac","conference_url":"https://api.media.ccc.de/public/conferences/15np"}]}