DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2016/1

2016 1

Main topic: Cyber security

 PUBLISHED: 14.4.2016

 
rr These articles were subject to peer-to-peer review

Click on headline to see more about article

Interview with Dušan Navrátil

Long term National Security Authority chief talks about the latest experience applying the cyber-security legislation and how the national CSIRT and government CERT work together. He also shares his views on the critical infrastructure ownership and the latest „Safe Harbour“ agreements replacement.

Executive Orders connected to Czech Cybersecurity Act – part V. rr

Vladimír Smejkal
The fifth part of the series explores the practical implications of several parallel legislative regulations of the cyber security in Czech Republic and what are the practial and legal ramifications of such a situation.

Security as a service – the new dimension of information security rr

Jiří Sedlák
The author explores the possibilities of providing the information security as a service analysis the approaches and challenges for the subjects of the cyber security regulations. Also explained are the details and possible benefits of the commercial Security Expert Center servise.

The myths and the reality – this time relating to mobile devices security rr

Richard Michálek
The article takes on a number of myths and misconseption around the security of mobile devices. The author suggests to keep the common sense approach to the design and implementation of security measures and applying critical thinking when it comes to securing the sensitive informatin.

Forensic analysis of mobile phones - part I. rr

Jakub Kothánek, Jaroslav Kothánek
The first part of the series about the forensic analysis of mobile devices explains the legal framework for such efforts and the critical points in the process from the perspective of the legislation. The author explains the practical legal and technical steps the expert needs to take in order to secure the information stored on the device.

Cyber defenses – looking for quality defenders - part II. rr

Pavel Klimeš
The next part of the series of articles on building cyber security defense forces deals with building up and strengthening the security teams. The author defi nes the professional capabilities needed within the modern security defense teams and how to hire, develop and motivate them. Included is a description of a possible career path for the security specialists and experts.

back  Back...

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top