{"id":36993,"date":"2025-11-17T23:37:05","date_gmt":"2025-11-18T04:37:05","guid":{"rendered":"https:\/\/staging.systech.ssdev.ca\/?page_id=36993"},"modified":"2025-11-18T00:47:06","modified_gmt":"2025-11-18T05:47:06","slug":"webinar-diversion-and-counterfeiting-uncovering-vulnerabilities","status":"publish","type":"page","link":"https:\/\/staging.systech.ssdev.ca\/de\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","title":{"rendered":"Webinar | Abzweigungen und F\u00e4lschungen: Schwachstellen aufdecken"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"36993\" class=\"elementor elementor-36993\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-overlay-color=\"#22B8B0\" data-dce-background-image-url=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Systech-anti-counterfeit-wine-webinar-banner_12-2023-1.png\" class=\"elementor-element elementor-element-c45c5ee e-flex e-con-boxed e-con e-parent\" data-id=\"c45c5ee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c89efd e-con-full e-flex e-con e-child\" data-id=\"6c89efd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f28def elementor-widget elementor-widget-heading\" data-id=\"1f28def\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">ON-DEMAND-WEBINAR\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-253b241 elementor-widget elementor-widget-heading\" data-id=\"253b241\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Abzweigungen und F\u00e4lschungen: Aufdeckung von Schwachstellen<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3c4743 e-flex e-con-boxed e-con e-parent\" data-id=\"b3c4743\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bbded74 e-con-full e-flex e-con e-child\" data-id=\"bbded74\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0af81b2 elementor-widget elementor-widget-text-editor\" data-id=\"0af81b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gef\u00e4lschte Produkte machen nicht an Grenzen halt. Die Auswirkungen von F\u00e4lschungen gehen \u00fcber die finanziellen Folgen hinaus. Sie stellen ein Risiko f\u00fcr die Gesundheit, den Lebensunterhalt und mehr dar - und betreffen Hersteller, Einzelh\u00e4ndler und Verbraucher gleicherma\u00dfen.\u00a0<br \/><br \/>Erkennen Sie, dass Bem\u00fchungen zur Bek\u00e4mpfung von Abzweigungen und F\u00e4lschungen einen programmatischen Ansatz erfordern, nicht nur den Einsatz von Technologie. Dieser Ansatz erfordert die Abstimmung von Strategie, Technologie, Organisation, Schulung und Ressourcen, um erfolgreich zu sein. Es besteht ein echter Bedarf an Zusammenarbeit, um die Identifizierung, R\u00fcckverfolgung und Authentifizierung des richtigen Produkts zu unterst\u00fctzen.<br \/><br \/>In diesem Webinar: \"Abzweigung und F\u00e4lschungen: Aufdecken von Schwachstellen und Abschw\u00e4chen von Risiken\" erfahren Sie, wie Sie Hindernisse \u00fcberwinden und Risiken proaktiv verringern k\u00f6nnen, indem Sie sich einen \u00dcberblick \u00fcber die Lieferkette verschaffen. Er\u00f6rtern Sie mit uns die Identifizierung von Abzweigungs- und F\u00e4lschungsrisiken, die Umsetzung bew\u00e4hrter Verfahren sowie die Einbindung der wichtigsten Interessengruppen, um erfolgreiche Ergebnisse zu erzielen.\u00a0<br \/><br \/>Um diesen Risiken zu begegnen, muss ein Unternehmensprogramm mit mehreren Ebenen des Produkt- und Lieferkettenschutzes entwickelt werden. Die R\u00fcckverfolgbarkeit der Lieferkette und die M\u00f6glichkeiten zur Produktauthentifizierung sind f\u00fcr die Bek\u00e4mpfung von Abzweigungen und F\u00e4lschungen unerl\u00e4sslich. Verpassen Sie es nicht!<\/p><p>\u00a0<\/p><h3>Lernziele:<\/h3><ol><li><p>Ermittlung der Stellen in der Lieferkette, an denen Abzweigungen und F\u00e4lschungen am wahrscheinlichsten sind<\/p><\/li><li><p>Wie man wichtige interdisziplin\u00e4re Interessengruppen einbindet und deren Unterst\u00fctzung gewinnt<\/p><\/li><li><p>Wie man Informationen aus intelligenter Software und intelligenten Werkzeugen nutzt, um die Bem\u00fchungen zu verst\u00e4rken<\/p><\/li><li><p>Anwendung bew\u00e4hrter Verfahren zur Bek\u00e4mpfung von Abzweigungen und F\u00e4lschungen in allen Branchen<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-508bdab e-con-full e-flex e-con e-child\" data-id=\"508bdab\" data-element_type=\"container\">\n\t\t<div data-dce-background-color=\"#F2F2F4\" class=\"elementor-element elementor-element-b652c84 e-con-full e-flex e-con e-child\" data-id=\"b652c84\" data-element_type=\"container\" id=\"content-form\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b23d18f elementor-widget elementor-widget-heading\" data-id=\"b23d18f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Zugang zum On-Demand-Webinar\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cd3bd7 elementor-widget elementor-widget-html\" data-id=\"8cd3bd7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script src=\"\/\/info.systechone.com\/js\/forms2\/js\/forms2.min.js\"><\/script> <form id=\"mktoForm_1079\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"de\"\/><\/form> <script>MktoForms2.loadForm(\"\/\/info.systechone.com\", \"304-PSB-492\", 1079);<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7af9b99 e-flex e-con-boxed e-con e-parent\" data-id=\"7af9b99\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0cbc36c e-con-full e-flex e-con e-child\" data-id=\"0cbc36c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-605121e elementor-widget elementor-widget-heading\" data-id=\"605121e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Redner\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa7f39c e-grid e-con-full e-con e-child\" data-id=\"fa7f39c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-40b4e4c e-con-full e-flex e-con e-child\" data-id=\"40b4e4c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-31ddbbd e-con-full e-flex e-con e-child\" data-id=\"31ddbbd\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-38852a9 e-con-full e-flex e-con e-child\" data-id=\"38852a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51ab190 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"51ab190\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\" class=\"attachment-medium size-medium wp-image-37030\" alt=\"\" srcset=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg 150w, https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW-12x12.jpg 12w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc3cade e-con-full e-flex e-con e-child\" data-id=\"fc3cade\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-818bcba elementor-widget elementor-widget-heading\" data-id=\"818bcba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Elisabeth Skoda\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c05bde8 elementor-widget elementor-widget-text-editor\" data-id=\"c05bde8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Leitender Redakteur, Packaging Europe<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09dd6c4 e-con-full e-flex e-con e-child\" data-id=\"09dd6c4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e52eb1 elementor-widget elementor-widget-text-editor\" data-id=\"3e52eb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Elisabeth kommt aus der \u00dcbersetzungs- und Online-Nachrichtenredaktion und arbeitet seit 2006 f\u00fcr Packaging Europe. In dieser Zeit hat sie ein umfassendes Verst\u00e4ndnis f\u00fcr die Verpackungsindustrie und ein Gesp\u00fcr f\u00fcr die zahlreichen Innovationen und Entwicklungen entwickelt, die sich im Laufe der Jahre ergeben haben.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f766688 e-con-full e-flex e-con e-child\" data-id=\"f766688\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-829e337 elementor-widget elementor-widget-heading\" data-id=\"829e337\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Gastgeber<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f964c3 e-grid e-con-full e-con e-child\" data-id=\"6f964c3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-174c61f e-con-full e-flex e-con e-child\" data-id=\"174c61f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3d83f28 e-con-full e-flex e-con e-child\" data-id=\"3d83f28\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5dcf36e e-con-full e-flex e-con e-child\" data-id=\"5dcf36e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4bd43 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"7e4bd43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW.jpg\" class=\"attachment-medium size-medium wp-image-37022\" alt=\"\" srcset=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW.jpg 150w, https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW-12x12.jpg 12w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53aa1ae e-con-full e-flex e-con e-child\" data-id=\"53aa1ae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5669dcf elementor-widget elementor-widget-heading\" data-id=\"5669dcf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Dave DeJean\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dedea9 elementor-widget elementor-widget-text-editor\" data-id=\"4dedea9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Vizepr\u00e4sident, Globale strategische Kunden, Systech<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2dc41d e-con-full e-flex e-con e-child\" data-id=\"f2dc41d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e8a916 elementor-widget elementor-widget-text-editor\" data-id=\"0e8a916\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dave DeJean ist f\u00fcr die strategischen Gesch\u00e4ftsm\u00f6glichkeiten von Systech verantwortlich. Er unterst\u00fctzt und schult Kunden und Interessengruppen in Bezug auf Best Practices f\u00fcr die Implementierung von L\u00f6sungen zur Serialisierung, R\u00fcckverfolgbarkeit und Authentifizierung in Unternehmen. Dave DeJean verf\u00fcgt \u00fcber mehr als 35 Jahre Marktkenntnis und praktische Erfahrung in der L\u00f6sungsentwicklung und Projektmethodik f\u00fcr die Einhaltung von Vorschriften, den Markenschutz und die R\u00fcckverfolgbarkeit in der Lieferkette. Er ist ein Experte f\u00fcr Verpackungsausf\u00fchrungssysteme, Produktidentifizierung und Transparenz in der Lieferkette.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ON-DEMAND WEBINAR Ablenkung und F\u00e4lschung: Schwachstellen aufdecken Gef\u00e4lschte Produkte \u00fcberschreiten die Grenzen. Die Auswirkungen von F\u00e4lschungen gehen \u00fcber die finanziellen Folgen hinaus. Sie stellen ein Risiko f\u00fcr die Gesundheit, den Lebensunterhalt und mehr dar und betreffen Hersteller, Einzelh\u00e4ndler und Verbraucher gleicherma\u00dfen.  Erkennen Sie, dass Ma\u00dfnahmen zur Bek\u00e4mpfung von Produktumlenkungen und F\u00e4lschungen einen programmatischen Ansatz erfordern, nicht nur den Einsatz von Technologien. Dieser Ansatz erfordert die Abstimmung von Strategie, Technologie, Organisation, Schulung und [...]<\/p>","protected":false},"author":41,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-36993","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech<\/title>\n<meta name=\"description\" content=\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.systech.ssdev.ca\/de\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech\" \/>\n<meta property=\"og:description\" content=\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.systech.ssdev.ca\/de\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Systech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/systechone\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T05:47:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@systechone\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\",\"name\":\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech\",\"isPartOf\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\",\"datePublished\":\"2025-11-18T04:37:05+00:00\",\"dateModified\":\"2025-11-18T05:47:06+00:00\",\"description\":\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\",\"contentUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.systech.ssdev.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#website\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/\",\"name\":\"Systech\",\"description\":\"a solutions division of Markem-Imaje\",\"publisher\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.systech.ssdev.ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#organization\",\"name\":\"Systech International\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png\",\"contentUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png\",\"width\":551,\"height\":124,\"caption\":\"Systech International\"},\"image\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/systechone\/\",\"https:\/\/x.com\/systechone\",\"https:\/\/www.linkedin.com\/company\/systech-international\",\"https:\/\/www.youtube.com\/channel\/UC1fz6UKo5eMa1WxgVMGRhpA\/videos\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.systech.ssdev.ca\/de\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","og_locale":"de_DE","og_type":"article","og_title":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","og_description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","og_url":"https:\/\/staging.systech.ssdev.ca\/de\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","og_site_name":"Systech","article_publisher":"https:\/\/www.facebook.com\/systechone\/","article_modified_time":"2025-11-18T05:47:06+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@systechone","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","url":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","name":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","isPartOf":{"@id":"https:\/\/staging.systech.ssdev.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","datePublished":"2025-11-18T04:37:05+00:00","dateModified":"2025-11-18T05:47:06+00:00","description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","breadcrumb":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage","url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","contentUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.systech.ssdev.ca\/"},{"@type":"ListItem","position":2,"name":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/staging.systech.ssdev.ca\/#website","url":"https:\/\/staging.systech.ssdev.ca\/","name":"Systech","description":"a solutions division of Markem-Imaje","publisher":{"@id":"https:\/\/staging.systech.ssdev.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.systech.ssdev.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/staging.systech.ssdev.ca\/#organization","name":"Systech International","url":"https:\/\/staging.systech.ssdev.ca\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/","url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png","contentUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png","width":551,"height":124,"caption":"Systech International"},"image":{"@id":"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/systechone\/","https:\/\/x.com\/systechone","https:\/\/www.linkedin.com\/company\/systech-international","https:\/\/www.youtube.com\/channel\/UC1fz6UKo5eMa1WxgVMGRhpA\/videos"]}]}},"_links":{"self":[{"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/pages\/36993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/comments?post=36993"}],"version-history":[{"count":16,"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/pages\/36993\/revisions"}],"predecessor-version":[{"id":37079,"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/pages\/36993\/revisions\/37079"}],"wp:attachment":[{"href":"https:\/\/staging.systech.ssdev.ca\/de\/wp-json\/wp\/v2\/media?parent=36993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}