Podcast with Katka Hůtová: Let’s not do it just for the sake of checking a box
Listen to the podcast with Katka Hůtová, who will guide you through the upcoming changes according to the new cybersecurity law.
Effective crisis communication during a cyber attack
Crisis communication during a cyber-attack should be swift, transparent and consistent to minimize damage and maintain the trust of all stakeholders. How to do it?
Suppliers of regulated service providers
The draft of the new Cybersecurity Act according to the NIS2 Directive does not forget about the regulation of suppliers of regulated services. What obligations will they have?
Money or data! What is ransomware?
Ransomware je typ škodlivého software s jediným cílem – zašifrovat vaše firemní data. Jak se proti němu mohou společnosti nejlépe bránit?
ChatGPT in employee hands
Tools like ChatGPT can make a lot of things easier in our everyday working lives. But they also put society at risk when used carelessly. How to work safely with chatbots?
Pentesters certification according to DORA
The DORA regulation will affect the penetration testing of financial institutions. But why is this important for their cybersecurity?
Security roles and their roll-out according to the new Cyber Security Act
With the new Cyber Security Act, companies will have to deal with the mandatory implementation of security roles. What are these roles and what will their responsibilities be?
DORA: Enhanced responsibility of senior management of financial institutions
DORA brings new rules for financial institutions and with them new obligations and increased responsibilities for their senior management.
DORA: Obligations of service providers in the financial sector
Nařízení DORA klade důraz kromě odolnosti finančních institucí i na bezpečnostní opatření jejich dodavatelů služeb IKT. Právě ti totiž hrají významnou roli v kybernetické bezpečnosti celého finančního sektoru.
NIS2: Obligations under the new cyber law
What are the obligations in the regime of higher and lower obligations under the draft of the Cybersecurity Act, which implements the requirements of NIS2 Directive?