This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Ako polícia vyšetruje kyberzločiny (mjr. Richard Valiček a kpt. Jan Dubec, Policie ČR)
https://www.youtube.com/watch?v=E3Tg1rwSk-o
Source: Bezpečný online svet
1 / 146
Next
KCCKB: Kyberbezpečnosť – revolúcia, či evolúcia
show link
Source: DataTrend Servise
Ransomvér? Vaše obavy sú oprávnené
show link
Source: HN špeciál
Útok, obrana, vylepšenie a zas znova
show link
Source: HN špeciál
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CISA - CYBER INCIDENTS
show link
show all
What is what in IT
66
Passive digital footprint
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
Severity of risks
• extremely high
• high
• low
• negligible
Source: it.portal
show all
Interesting
22
79% of organizations have a security gap
Source: Internet
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
show all
Recomendations
377
Suppliers
Implement supplier monitoring and review
Source: it.portal
Risk Management
Implement regular risk assessment (e.g. ISO 27005)
Source: it.portal
show all
Institutions
51
Office for Standardization, Metrology and Testing of the Slovak Republic
Standards portal
show link
Národný bezpečnostný úrad
show link
show all
Legislative
82
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 3 ods. 4 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 324/02
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 3 ods. 4 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 324/02
show link
Source: Eur-Lex
315/2021 Sb.
VYHLÁŠKA ze dne 24. srpna 2021o bezpečnostních úrovních pro využívání cloud computingu orgány veřejné moci
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC 27006:2015
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
ISO/IEC TS 27008:2019
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
Technologies
14
Fortinet
show link
pfSense
show link
show all
Infographics
7
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
10 biggest threats for 2030
Source: ENISA
show all
Events
0
Certifications
0
Acreditations
0
Media
436
96. Hacking a kybernetická bezpečnost - Blind SQL injection
show link
Source: David Šetek - Hackni svou budoucnost
Čo príde po IT kolapse? Už prišlo. Phishingové kampane a útoky
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use