{"id":753,"date":"2017-07-17T12:15:00","date_gmt":"2017-07-17T12:15:00","guid":{"rendered":"https:\/\/www.upgreat.pl\/?p=753"},"modified":"2022-04-19T12:15:44","modified_gmt":"2022-04-19T12:15:44","slug":"podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych","status":"publish","type":"post","link":"https:\/\/www.upgreat.pl\/en\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/","title":{"rendered":"Summary of the &quot;Workshop - security of information systems&quot;."},"content":{"rendered":"<p>We finished in early July&nbsp;<a href=\"https:\/\/www.upgreat.pl\/en\/aktualnosci\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\" target=\"_blank\" rel=\"noreferrer noopener\">series of workshops<\/a>&nbsp;introducing our clients to IT security issues. There were four meetings devoted to the following topics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Penetration tests (reconnaissance, scanning, enumeration, metasploit, password cracking, wifi analysis),<\/li><li>Social engineering tests (backdoors, delivering malware, avoiding detection by antiviruses),<\/li><li>Web application tests (password cracking, SQL injecting, BurpSuite scanning),<\/li><li>Risk analysis and protection of personal data in the context of GDPR.<\/li><\/ul>\n\n\n\n<p>In total, about 40 people visited us during the workshops. More people were interested, but due to the capacity of our conference room, we could not register all of them<\/p>\n\n\n\n<p>Our experience gained so far during security audits and system tests shows that the security solutions used in enterprises do not correspond to rapidly changing threats, and one of the most effective and, at the same time, the most neglected security measures for IT systems is training and a continuous process of improving employee competences. It should be noted that training should be periodic and be oriented towards updating knowledge in line with emerging threats.<\/p>\n\n\n\n<p>I am pleased to inform you that our autumn safety workshop proposals for you are very interesting. You will of course be informed about the dates. The topics presented include new generation firewalls operating on the application layer, protection of workstations with the use of behavioral analysis, issues of backup as a service and outsourcing of services related to security.<\/p>\n\n\n\n<p>Using the links below, you can read the materials from our workshops:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.upgreat.pl\/uploads\/AKTUALNOSCI\/Prezentacje_Security_Workshop_1H17\/@warsztat-ethical-hackera-SOC.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Ethical hacker workshop<\/a>,<\/li><li><a href=\"https:\/\/www.upgreat.pl\/uploads\/AKTUALNOSCI\/Prezentacje_Security_Workshop_1H17\/@RODO_analiza_ryzyka_warsztaty.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR workshops - risk analysis<\/a>,<\/li><li><a href=\"https:\/\/www.upgreat.pl\/uploads\/AKTUALNOSCI\/Prezentacje_Security_Workshop_1H17\/@aktywa-zagrozenia-srodki_ochrony.xls\" target=\"_blank\" rel=\"noreferrer noopener\">assets - risk analysis<\/a>.<\/li><\/ul>\n\n\n\n<p>We would like to thank all participants for their time and feel free to contact us.<\/p>","protected":false},"excerpt":{"rendered":"<p>At the beginning of July, we completed a series of workshops introducing our clients to IT security issues. Four meetings were held devoted to the following topics: Penetration testing (reconnaissance, scanning, enumeration, metasploit, password cracking, WiFi analysis), Social engineering testing (backdoors, malware delivery, avoiding detection by antiviruses), Web application testing (password cracking, SQL injection, BurpSuite scanning), Risk analysis and personal data protection in the context of GDPR. In total, [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-753","post","type-post","status-publish","format-standard","hentry","category-aktualnosci"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Podsumowanie &quot;Warsztat\u00f3w - bezpiecze\u0144stwo system\u00f3w informatycznych&quot;. | Upgreat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Podsumowanie &quot;Warsztat\u00f3w - bezpiecze\u0144stwo system\u00f3w informatycznych&quot;. | Upgreat\" \/>\n<meta property=\"og:description\" content=\"Na pocz\u0105tku lipca zako\u0144czyli\u015bmy&nbsp;cykl warsztat\u00f3w&nbsp;wprowadzaj\u0105cych naszych Klient\u00f3w w zagadnienia bezpiecze\u0144stwa IT. Odby\u0142y si\u0119 cztery spotkania po\u015bwi\u0119cone nast\u0119puj\u0105cym tematom: Testom penetracyjnym (rekonesans, skanowanie, enumeracja, metasploit, \u0142amanie hase\u0142, analiza wifi), Testom socjotechnicznymi (backdoory, dostarczanie malware&#8217;u,unikanie wykrycia przez antywirusy), Testom aplikacji webowych (\u0142amanie hase\u0142, SQL injecting, skanowanie BurpSuite), Analizie ryzyka i ochronie danych osobowych w kontek\u015bcie RODO. \u0141\u0105cznie, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-17T12:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-19T12:15:44+00:00\" \/>\n<meta name=\"author\" content=\"ridos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ridos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\"},\"author\":{\"name\":\"ridos\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\"},\"headline\":\"Podsumowanie &#8222;Warsztat\u00f3w &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych&#8221;.\",\"datePublished\":\"2017-07-17T12:15:00+00:00\",\"dateModified\":\"2022-04-19T12:15:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"articleSection\":[\"Aktualno\u015bci\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\",\"url\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\",\"name\":\"Podsumowanie \\\"Warsztat\u00f3w - bezpiecze\u0144stwo system\u00f3w informatycznych\\\". | Upgreat\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2017-07-17T12:15:00+00:00\",\"dateModified\":\"2022-04-19T12:15:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aktualno\u015bci\",\"item\":\"https:\/\/www.upgreat.pl\/category\/aktualnosci\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Podsumowanie &#8222;Warsztat\u00f3w &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych&#8221;.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\",\"name\":\"ridos\",\"sameAs\":[\"https:\/\/www.upgreat.pl\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Podsumowanie \"Warsztat\u00f3w - bezpiecze\u0144stwo system\u00f3w informatycznych\". | Upgreat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/","og_locale":"en_US","og_type":"article","og_title":"Podsumowanie \"Warsztat\u00f3w - bezpiecze\u0144stwo system\u00f3w informatycznych\". | Upgreat","og_description":"Na pocz\u0105tku lipca zako\u0144czyli\u015bmy&nbsp;cykl warsztat\u00f3w&nbsp;wprowadzaj\u0105cych naszych Klient\u00f3w w zagadnienia bezpiecze\u0144stwa IT. Odby\u0142y si\u0119 cztery spotkania po\u015bwi\u0119cone nast\u0119puj\u0105cym tematom: Testom penetracyjnym (rekonesans, skanowanie, enumeracja, metasploit, \u0142amanie hase\u0142, analiza wifi), Testom socjotechnicznymi (backdoory, dostarczanie malware&#8217;u,unikanie wykrycia przez antywirusy), Testom aplikacji webowych (\u0142amanie hase\u0142, SQL injecting, skanowanie BurpSuite), Analizie ryzyka i ochronie danych osobowych w kontek\u015bcie RODO. \u0141\u0105cznie, [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/","og_site_name":"Upgreat","article_published_time":"2017-07-17T12:15:00+00:00","article_modified_time":"2022-04-19T12:15:44+00:00","author":"ridos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ridos","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/#article","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/"},"author":{"name":"ridos","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101"},"headline":"Podsumowanie &#8222;Warsztat\u00f3w &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych&#8221;.","datePublished":"2017-07-17T12:15:00+00:00","dateModified":"2022-04-19T12:15:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/"},"wordCount":309,"publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"articleSection":["Aktualno\u015bci"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/","url":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/","name":"Podsumowanie \"Warsztat\u00f3w - bezpiecze\u0144stwo system\u00f3w informatycznych\". | Upgreat","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2017-07-17T12:15:00+00:00","dateModified":"2022-04-19T12:15:44+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/blog\/podsumowanie-warsztatow-bezpieczenstwo-systemow-informatycznych\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Aktualno\u015bci","item":"https:\/\/www.upgreat.pl\/category\/aktualnosci\/"},{"@type":"ListItem","position":3,"name":"Podsumowanie &#8222;Warsztat\u00f3w &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych&#8221;."}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101","name":"ridos","sameAs":["https:\/\/www.upgreat.pl"]}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=753"}],"version-history":[{"count":1,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/753\/revisions"}],"predecessor-version":[{"id":754,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/753\/revisions\/754"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/categories?post=753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/tags?post=753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}