Recomendations
 |
Suppliers and Third Parties
Implement due diligence process
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Implement mandatory training
Source: it.portal
Implement regular tests
Source: it.portal
show all
 Institutions
|
51 |
National Office for Cyber and Information Security show link
Nationales Koordinierungszentrum Cybersicherheit (NCC-AT) show link
show all
 Legislative
|
82 |
Vyhláška o kybernetické bezpečnosti show link
Source: e-sbirka
VYHLÁŠKA Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o šifrovej ochrane informácií show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|