Cyber Security Workshop in Warsaw

Cyber Security Workshop in Warsaw Gruppo SCAI - SCAI Polska 29 october 2015 -20151029-300x200-3w

The Workshop on data security, electronic payments and online communication, organized as part of the European Month of Digital Security, was held October 29th at the headquarters of the National Chamber of Commerce in Warsaw.

 29 october 2015 – Warsaw, Cyber Security Workshop

Cyber Security Workshop in Warsaw


The conference, organized by the National Chamber of Commerce in Warsaw and CERT.PL, sponsored by the Ministry of Administration and Digitization of Poland, aimed to address the issue of cyber security threats on the network to propose solutions. The event was attended by F-Secure, Microsoft, Facebook, UPC Polska Poczta Polska, ThinktankCyfrowy.pl and by the community Hacker Space Warsaw.

During the security conference in Warsaw, the most common threats of Polish network were analyzed, and during the workshops there were explained good practices for a more conscious use of digital tools in the field of data security, electronic payments and online communication business inktankCyfrowy.pl and by the community Hacker Space Warsaw.

“In Poland, every day 280 000 computers are infected by active malware”; “A worrying trend, in 2014 there were several attacks against online banking users”; “The most common way to infect personal computers is with attachments” – informs CERT.PL, author of a report on major trends and issues related to information security in Poland in 2014.

Conference link: Cyber Security Workshop in Warsaw, 29/10/2015


The challenges of information security

Companies have to prevent attacks on networks and IT infrastructure, to ensure data security and business continuity of IT services. In the retail sector for example, according to IDC (International Data Corporation), there have experienced an average of 6.2 attacks per year, of which 2.2 have defeated the defenses with times from 6 to almost 11 hours. There are also constantly increasing electronic payments on the network with use of various digital communication channels, including social networks. It is necessary therefore to be extremely careful on the issues of cyber security and to take appropriate technical, organizational and procedural solutions, in order to maintain high levels of information security.

Cybersecurity & Networking Services
The security of information systems, applications and corporate networks, requires continuous monitoring. Phenomena now established as BYOD (Bring Your Own Device), mobility and cloud, they require the necessary security solutions: networking and wireless security policies, Data Management & Applications Security Policy. Companies need partner with expertise in IT security, which can help in the identifying of potential vulnerabilities and in proposing corrective action for data and enterprise network protection.


Gruppo SCAI: the commitment to IT security
Gruppo SCAI has always been at the forefront to ensure companies data security and security of data flows in the passage of information between networks and IT systems. The cyber security competence center of SCAI Group, it is able to offer companies the best solutions for the protection of IP networks, security and data management. It also offers services to businesses identity and access management, Application & Data Security and Network Security, for an effective global strategy of cyber security.

Ne.Mo., Network Monitoring Tool
For the monitoring of enterprise IP networks, SCAI Group has developed a simple, but effective tool, allowing easy control and efficient management of IP networks (routers, switches, etc.) with constant monitoring of web services. Ne.Mo.® is used by major telecommunications operators, data centers and companies that pay attention to connectivity and IT services in Italy. With SCAI Polska also Polish companies will be able to use this simple and effective tool.

Cyber Security Intelligence
The security of information systems, applications and corporate networks, requires continuous monitoring. Phenomena now established as BYOD (Bring Your Own Device), mobility and cloud, they require the necessary security solutions: networking and wireless security policies, Data Management & Applications Security Policy. Companies need partner with expertise in IT security, which can help in the identifying of potential vulnerabilities and in proposing corrective action for data and enterprise network protection.