Roman Čupka

Flowmon, Principal Consultant CEE
Sign in to International ITAPA Congress 2020
  • Best practices in the detection and resolution of cyber security incidents   |   Medzinárodný kongres ITAPA 2019

    During the presentation we will introduce best practices for the application of cybersecurity in organizations and touch upon several technology platforms within the important sections of Act 69/2018 Coll.

  • The Hacker's Fingerprints   |   CyberTAPA

  • The visibility in computer network matters   |   Medzinárodný kongres ITAPA 2018: Hacking the Future

    Cybernetic Preservation in presence as well as in future is not addressed without the so-called Threat Intelligence that identifies known attackers and without real-time behavioral analysis that, in combination with machine learning and artificial intelligence, assesses communication in computer networks and user behavior. In conjunction with automation tools and classification mechanisms, it is now possible to shorten the reaction time to compromise safety from months to minutes, while at the same time obtaining the necessary data for forward-looking steps that enhance prevention. For both public and corporate organizations, this is the only way to comply with new stringent regulatory requirements, such as avoiding fines and a fiasco, which typically follows the release of sensitive data, or the malfunctioning of services for citizens or customers.

  • Detection, automation and reporting of real-time cyber security events and incidents   |   Medzinárodný kongres ITAPA 2018: Hacking the Future

    The identification and analysis of security incidents today takes 45 to 250 days for organizations in the public and private sectors, and usually occurs only when, for example, escape sensitive data, personal data, or critical service malfunction. However, new legislation, such as the Cyber Security Law, based on the NIS directive, as well as other legislation such as the GDPR, requires the reporting of incidents in practically immediate terms - within a few hours or days, and at the same time implementing the tools and procedures that will result from incidents prevented. What needs to be done from a technical and procedural point of view to accelerate threat identification, streamline responses and, ultimately, meet regulatory requirements?

Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným