Become a partner

Július Selecký

ESET, Solution Architect
He has been working in the field of information technology and cybersecurity for over 15 years. After completing his doctoral studies at Comenius University in Faculty of Management, where he specialized in information systems, he put his knowledge into practice. He works not only at ESET, but also at his alma mater as an assistant professor. Since 2018, he has worked at ESET as a Senior Technical Pre-Sales Representative, and since July 2025, he has held the position of Solution Architect. He actively collaborates with clients and partners, primarily in the enterprise segment, to educate them and help integrate the latest trends and practices in the field of cybersecurity. In addition to consulting, testing, and presentations, he leads practical workshops that enable customers not only to understand the products but also to implement solutions into their daily operations effectively.
  • From incident to recovery: modern trends in detection and response (7 min)
    As a combination of advanced security solutions, it creates proactive and intelligent protection without the need for your own SOC.
  • Security as a service – when the hospital sleeps, MDR stays awake (7 min)
    A look at managed detection and response in healthcare environments.
  • DISCUSSION "Business Continuity Management - How to Guarantee the Operation of (not only critical) Infrastructure?"
  • DISCUSSION "Cybersec and incidents"
  • Don't give threats a chance with sophisticated EDR tools

    We build walls to keep the attackers away. Ordinary users can have infected workstations for several months without knowing it. Time play is a key role in these cases. Detection and Response (EDR) tools are designed to complement existing endpoint security. It is a strategy that allows your company to constantly monitor potential cyber threats and respond proactively to them. Be one step ahead with sophisticated EDR tools - don't give threats a chance. During the presentation, we identify the key benefits of EDR systems such as incident capture, network isolation of devices or detection of behavioral anomalies.

  • How to effectively "hunt" threats and investigate incidents
    At the beginning we were given a short assignment. Our customer needed to improve the visibility of his workstations so that he was able to monitor and block threats in real time in his heterogeneous environment. The implementation of ESET Enterprise Inspector EDR has just started. In today's coronavirus age, there is enormous pressure on IT departments, not only because of the transition to home office, but also because of the increased rate of spreading threats. In the presentation, we will show you some specific examples of how we captured, investigated and blocked advanced threats.
  • Discussion
    Dicussion of invited guests:
    Ján Andraško, Binary Confidence
    Roman Čupka, Flowmon Networks
    Marek Kľoc, LYNX
    Peter Kočík, FORTINET
    Július Selecký, ESET
    Marek Zeman, Tatra Banka
Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným