Classification of information in context
This article provides a practical information about classification of information implementation and its relationship to the security standards, the requirements of the law of cyber security and regulations GDPR. We will also focus on the benefits of classification of information in the process of building security in a corporate environment, and the subsequent implementation of security technologies for the detection and prevention of information leakage and security monitoring. The examples of proper deployment of information classification will be provided. We will show the importance of a tool for increases security awareness in the environment of the company.
Since 2013 he works as a Senior IT Security Consultant at the company AEC, division of security technologies, which takes the lead role of security architect. His main expertise includes the design and audit of secure network infrastructure. Its core technologies are NG firewalls, NBA and sandbox. In the last two years, he takes the role of Product Owner of tool designed for document classification named DocTag.
Matej Kačic, AEC
He studied and graduated on Faculty of Information Technology, Brno University of Technology, where currently works as a researcher and studies Ph.D. program in the field of security systems and wireless network security. He is member of the Security @ FIT BUT group and actively lectures Security topics on a campus.
Since 2013 he works as a Senior IT Security Consultant at the company AEC, division of security technologies, which takes the lead role of security architect. His main expertise includes the design and audit of secure network infrastructure. Its core technologies are NG firewalls, NBA and sandbox. In the last two years, he takes the role of Product Owner of tool designed for document classification named DocTag.
Maroš Barabas, AEC
Maros Barabas heads the division of security technologies in AEC a.s. and works as a researcher on Faculty of Information Technology, Brno University of Technology where he obtained Ph.D. degree in the field of behavioural computer security.
He has over 10 years of experience in IT security which includes ethical hacking, leading a team of IT security specialists focused on security technologies, defining security requirements, designing and auditing security aspects of various types of environments and architectures. For the last few years, he focuses on advanced security technologies.