[{"title":"Cybercrime","uid":78,"type":"category"},{"title":"General Data Protection Regulation (GDPR)","uid":79,"type":"category"},{"title":"Constitutional Law","uid":81,"type":"category"},{"title":"E-Governance","uid":82,"type":"category"},{"title":"Administrative Law","uid":83,"type":"category"},{"title":"Police and Regulatory Law","uid":84,"type":"category"},{"title":"State and Government\u2019s Duties, IT Security Regulations","uid":85,"type":"category"},{"title":"Critical Infrastructure","uid":133,"type":"category"},{"title":"National Data Protection Law","uid":87,"type":"category"},{"title":"Public Procurement Law","uid":88,"type":"category"},{"title":"Criminal Law","uid":89,"type":"category"},{"title":"IT Forensics","uid":121,"type":"category"},{"title":"Legal Informatics","uid":102,"type":"category"},{"title":"Liability","uid":93,"type":"category"},{"title":"Intellectual Property and Competition Law","uid":94,"type":"category"},{"title":"Antitrust","uid":95,"type":"category"},{"title":"IT-Compliance","uid":96,"type":"category"},{"title":"E-Commerce","uid":97,"type":"category"},{"title":"Consumer Rights","uid":98,"type":"category"},{"title":"Product- and Producer Liability","uid":99,"type":"category"},{"title":"Evidence and Procedural Law","uid":100,"type":"category"},{"title":"IT Contract Law","uid":101,"type":"category"},{"title":"Network Security","uid":104,"type":"category"},{"title":"Endpoint Security","uid":105,"type":"category"},{"title":"Communication Security","uid":106,"type":"category"},{"title":"Web Security","uid":107,"type":"category"},{"title":"Application Security","uid":108,"type":"category"},{"title":"Data Security","uid":109,"type":"category"},{"title":"Privacy Protection","uid":110,"type":"category"},{"title":"Cryptography","uid":111,"type":"category"},{"title":"Hardware Security","uid":112,"type":"category"},{"title":"Embedded Security","uid":113,"type":"category"},{"title":"Physical Security","uid":114,"type":"category"},{"title":"Security Information and Event Management (SIEM)","uid":115,"type":"category"},{"title":"IT Security Insurance","uid":117,"type":"category"},{"title":"Consulting Services","uid":118,"type":"category"},{"title":"IT Security Training and Certifications","uid":119,"type":"category"},{"title":"Managed IT Security Services","uid":120,"type":"category"},{"title":"Identity and Access Management","uid":122,"type":"category"},{"title":"Information Security Management ","uid":123,"type":"category"},{"title":"Payment\/Banking","uid":125,"type":"category"},{"title":"Biometrics","uid":126,"type":"category"},{"title":"Mobile Security","uid":127,"type":"category"},{"title":"Internet of Things","uid":128,"type":"category"},{"title":"Cloud Security","uid":129,"type":"category"},{"title":"Industrial Security","uid":130,"type":"category"},{"title":"Automotive Security","uid":131,"type":"category"},{"title":"Governmental\/Defense Security","uid":132,"type":"category"},{"title":"Individual Aspects","uid":135,"type":"category"},{"title":"Political Aspects","uid":136,"type":"category"},{"title":"Society as a whole","uid":137,"type":"category"},{"title":"Human Element in Security","uid":138,"type":"category"}]