This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
DataTrend Services HAC 2022 teaser
https://www.youtube.com/watch?v=YLvsjSoW9-g
Source: DataTrend Servise
Previous
10 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CERT-EU Threat intelligence
show link
CISA - CYBER INCIDENTS
show link
show all
What is what in IT
66
Disaster recovery
is the organization's ability to react and recover from an event that negatively affected the company's operations
Disaster recovery plan - Key areas
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
show all
Interesting
22
80% of organizations will use BaaS/DRaaS for at least some of their servers
Source: Veeam
300,000 new instances of malware are generated daily
Source: Internet
show all
Recomendations
377
Compliance and Audit
Implement centralized documentation
Source: it.portal
Technical Measures
Evaluate and implement minimum security standards.
Source: it.portal
show all
Institutions
51
WORD-LEX
Legal and information portal
show link
NCC-IT
Agenzia per la Cybersicurezza Nazionale (ACN)
show link
show all
Legislative
82
412/2005 Sb.
ZÁKON ze dne 21. září 2005 o ochraně utajovaných informací a o bezpečnostní způsobilosti
show link
Source: e-sbirka
12/1997 Sb.
ZÁKON ze dne 24. ledna 1997
o bezpečnosti a plynulosti provozu na pozemních komunikacích
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC TS 27006-2:2021
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
Technologies
14
OpenVPN
show link
Ubiquiti
show link
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Takto si tu žijeme v kyberpriestore. Bezpečnosť je jedna, prístupy rôzne
show link
Source: HN špeciál
Sú už všade. Zbierajú, analyzujú, posielajú a ukladajú dáta. A bezpečnosť?
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use