Become a partner

Peter Dekýš

ESET spol. s r.o., Director of ESET Services
After studies at Faculty of Electrical Engineering and Information Technology, Slovak University of Technology in Bratislava and PhD studies of Electronic computers (1993) he taught at Department of Informatics and information Technologies, slovak University of Technology in Bratislava with focus on computer networks and  business information systems. Since 1997 he was a security and computer networks consultant for Orga-Trade, a.s. In 2001 he started to work for S&T Slovakia as consultancy manager with focus on complex solutions of information systems infrastructure. He works for ESET since 2009, his main responsibilities is information security consultancy for ESET and clients from Slovakia and Czech Republic.
  • ESET Cyber Security Services   |   Medzinárodný kongres ITAPA 2015: No Borders
    Why not miss this presentation?
    Early Warning provides information about malicious programs and related configurations, which are being prepared, or actually used in an attack against a specific organization or its customers (a targeted threat).

    The ability to gather the latest information about emerging threats in cyberspace plays a crucial role in the protection of company data assets. Detailed knowledge of security threats provides companies with valuable overview about the present-day risks they are exposed to. By knowing more about these security risks, it makes it possible to actively prevent potential damages, or at least to implement the necessary measures to mitigate them. ESET Threat Intelligence System and Early Warning service as its part, helps in recognizing the security threats about malicious programs, their properties, as well as servers used for their propagation, in addition to other aspects of their functioning. Instead of givin you general, non-descript warnings about malware, the Early Warning Service notifies you about the threats specifically targeting your organization.


  • More dangerous than ever before? The gates of security in the information system.   |   Kongres ITAPA 2013: Putting IT together
    Why not to miss the presentation?
    Peter Dekýš will present statistical data how producers of harmful software use social engineering techniques. He will also talk about the findings from practical tests of some information systems.  

    Executive Summary:
    The presentation discusses the statistics of vulnerabilities exploited by malware writers. It compares the situation in Slovakia and the world, and select countries.
    The presented statistical data will be supported by the findings of testing conducted on request by a number of Slovak companies.  The aim of malware writers and real-life findings point to the importance of the user in the information system as the key element in information security.
  • A Survey of Information Security Management   |   Kongres ITAPA 2011: Desať rokov inspirácií
    One of key reasons for implementation of ICT into public administration is cost reduction. On the other hand new information systems or connection with existing systems bring new risks and security threats. Administration of existing systems requires constant management of security risks as well. The other side of implementation of ICT is thus a need for integrity, availability and security of public administration information systems. The best solution for optimum use of financial means for information security is to use time-proven information security management system. From May till August 2011 ESET has conducted a survey of information security management in Slovakia. The presentation will present the survey findings with special regard to public administration institutions.
  • Optimal cost of information security   |   Kongres ITAPA 2011: Desať rokov inspirácií
    The presentation will take a closer look at some of the findings from a survey of information security management in Slovakia conducted by ESET in 2011. It will try to find answers on some of the questions that come with effective management of costs for information security or with development of information security management systems: How to spend budget for information security effectively? How to develop an effective system of information security management? Whom to appoint and train to be responsible for information security when lack of specialists and their training becomes and obstacle on the way towards secure, integral and available public administration information systems?
Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným
Nastavenie súborov cookies