{"id":757,"date":"2017-04-10T12:16:00","date_gmt":"2017-04-10T12:16:00","guid":{"rendered":"https:\/\/www.upgreat.pl\/?p=757"},"modified":"2022-04-19T12:16:42","modified_gmt":"2022-04-19T12:16:42","slug":"warsztaty-bezpieczenstwo-systemow-informatycznych","status":"publish","type":"post","link":"https:\/\/www.upgreat.pl\/en\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/","title":{"rendered":"Workshops - security of information systems"},"content":{"rendered":"<p>Ladies and gentlemen,<\/p>\n\n\n\n<p>IT system security issues are of interest not only to institutions such as banks, energy companies and government administration. The problem affects all companies, regardless of their size, on a daily basis, including many of our clients. According to the report entitled &quot;Business protection in digital transformation or 4 steps to a safer company&quot; recently published by PwC Polska, as many as 96% companies experienced over 50 security incidents in the last year. Due to the growing integration of production systems with IT systems, threats also apply to the continuity of production.<\/p>\n\n\n\n<p>According to our experience, the most common (realized) manifestation of cybercriminals&#039; activity among our clients are the effects of ransomware in order to obtain a ransom. We wrote about the spectacular amounts of ransom&nbsp;<a href=\"https:\/\/www.upgreat.pl\/en\/blog\/czy-pacjenci-moga-czuc-sie-bezpiecznie-systemy-it-w-sluzbie-zdrowia-celem-atakow-cyber-przestepcow\/\" target=\"_blank\" rel=\"noreferrer noopener\">in an article on our blog<\/a>. In this context, it is also worth considering attacks on production systems (OT) such as production lines, industrial automation, and warehouses. In this case, you can also expect interest from cybercriminals - they can count on a large ransom for withdrawing from the attack, since in some companies known to us the costs of stopping and restarting production are counted in millions of zlotys.<\/p>\n\n\n\n<p>In order to meet the expectations of our clients and to make them aware of the scale of the threats, we decided to organize a series of 4 workshops during which we will show how and how easy it is to threaten our IT and OT systems. Below you will find the dates and agendas of individual meetings. The meetings will be held at our company&#039;s headquarters in Pozna\u0144 at 22 Ostrobramska Street. The duration of each workshop is 4 hours, and participation is free of charge.<\/p>\n\n\n\n<p>During meetings 1, 2 and 3, please have a computer with a virtual machine with the KALI Linux distribution with you, the installation version of which can be downloaded using&nbsp;<a href=\"https:\/\/www.offensive-security.com\/kali-linux-vmware-virtualbox-image-download\/\" target=\"_blank\" rel=\"noreferrer noopener\">of this link<\/a>.<\/p>\n\n\n\n<p><strong>Workshop 1 - Introduction to Penetration Testing - April 25, 2017<\/strong><\/p>\n\n\n\n<p>Topics:<br>- information reconnaissance,<br>- scanning and enumeration,<br>- brute force and dictionary attacks on passwords,<br>- attacks on WLAN networks.<\/p>\n\n\n\n<p>To register for the workshop on April 25, 2017, please use&nbsp;<a href=\"https:\/\/www.upgreat.pl\/en\/formularz-zgloszeniowy\/warsztat-1-wprowadzenie-do-testow-penetracyjnych\/\">registration form<\/a>.<\/p>\n\n\n\n<p><strong>Workshop 2 - Penetration Testing and Social Engineering - May 16, 2017<\/strong><\/p>\n\n\n\n<p>Topics:<br>- metasploit,<br>- social engineering toolkit,<br>- generating backdoors,<br>- C&amp;C servers.<\/p>\n\n\n\n<p>To register for the workshop on May 16, 2017 please use&nbsp;<a href=\"https:\/\/www.upgreat.pl\/en\/formularz-zgloszeniowy\/bezpieczenstwo-it-warsztat-nr-2-testy-penetracyjne-i-socjotechniki\/\">registration form<\/a>.<\/p>\n\n\n\n<p><strong>Workshop 3 - Web Application Penetration Testing - May 30, 2017<\/strong><\/p>\n\n\n\n<p>Topics:<br>- structure of web applications (languages, frameworks, web servers),<br>- introduction to SQL,<br>- vulnerability scanning,<br>- sql-injection and CSS attacks.<\/p>\n\n\n\n<p>To register for the workshop on May 30, 2017, please use&nbsp;<a href=\"https:\/\/www.upgreat.pl\/en\/formularz-zgloszeniowy\/bezpieczenstwo-it-warsztat-nr-3-testy-penetracyjne-aplikacji-webowych\/\">registration form<\/a>.<\/p>\n\n\n\n<p><strong>Workshop 4 - General Data Protection Regulation (May 4, 2016, Official Journal of the European Union) - moved to July 4, 2017<\/strong><\/p>\n\n\n\n<p>Topics:<br>- uniform rules throughout the European Union,<br>- new obligations of the Data Protection Officer,<br>- risk analysis - methodologies and examples,<br>- severe penalties.<\/p>\n\n\n\n<p>To register for the workshop on June 20, 2017 please use&nbsp;<a href=\"https:\/\/www.upgreat.pl\/en\/formularz-zgloszeniowy\/bezpieczenstwo-it-warsztat-nr-4-rozporzadzenie-ogolne-o-ochronie-danych-osobowych-4-maja-2016-roku-dziennik-urzedowy-unii-europejskiej\/\">registration form<\/a>.<\/p>\n\n\n\n<p>You&#039;re welcome!<\/p>","protected":false},"excerpt":{"rendered":"<p>Ladies and Gentlemen, Issues related to the security of IT systems are of interest not only to institutions such as banks, energy companies and government administration. The problem affects all companies every day, regardless of size, including many of our clients. According to the report entitled &quot;Business protection in digital transformation or 4 steps to a safer company&quot; published [...]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-757","post","type-post","status-publish","format-standard","hentry","category-aktualnosci"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Warsztaty - bezpiecze\u0144stwo system\u00f3w informatycznych | Upgreat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Warsztaty - bezpiecze\u0144stwo system\u00f3w informatycznych | Upgreat\" \/>\n<meta property=\"og:description\" content=\"Szanowni Pa\u0144stwo, Zagadnienia zwi\u0105zane z bezpiecze\u0144stwem system\u00f3w IT znajduj\u0105 si\u0119 w obszarze zainteresowania nie tylko instytucji takich jak banki, firmy energetyczne i administracja rz\u0105dowa. Problem na co dzie\u0144 dotyka wszystkich firm niezale\u017cnie od wielko\u015bci, w tym r\u00f3wnie\u017c wielu naszych Klient\u00f3w.&nbsp;Wed\u0142ug raportu pod nazw\u0105 &#8222;Ochrona biznesu w cyfrowej transformacji czyli 4 kroki do bezpieczniejszej firmy&#8221; opublikowanego [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-10T12:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-19T12:16:42+00:00\" \/>\n<meta name=\"author\" content=\"ridos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ridos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\"},\"author\":{\"name\":\"ridos\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\"},\"headline\":\"Warsztaty &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych\",\"datePublished\":\"2017-04-10T12:16:00+00:00\",\"dateModified\":\"2022-04-19T12:16:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"articleSection\":[\"Aktualno\u015bci\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\",\"url\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\",\"name\":\"Warsztaty - bezpiecze\u0144stwo system\u00f3w informatycznych | Upgreat\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2017-04-10T12:16:00+00:00\",\"dateModified\":\"2022-04-19T12:16:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aktualno\u015bci\",\"item\":\"https:\/\/www.upgreat.pl\/category\/aktualnosci\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Warsztaty &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\",\"name\":\"ridos\",\"sameAs\":[\"https:\/\/www.upgreat.pl\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Warsztaty - bezpiecze\u0144stwo system\u00f3w informatycznych | Upgreat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/","og_locale":"en_US","og_type":"article","og_title":"Warsztaty - bezpiecze\u0144stwo system\u00f3w informatycznych | Upgreat","og_description":"Szanowni Pa\u0144stwo, Zagadnienia zwi\u0105zane z bezpiecze\u0144stwem system\u00f3w IT znajduj\u0105 si\u0119 w obszarze zainteresowania nie tylko instytucji takich jak banki, firmy energetyczne i administracja rz\u0105dowa. Problem na co dzie\u0144 dotyka wszystkich firm niezale\u017cnie od wielko\u015bci, w tym r\u00f3wnie\u017c wielu naszych Klient\u00f3w.&nbsp;Wed\u0142ug raportu pod nazw\u0105 &#8222;Ochrona biznesu w cyfrowej transformacji czyli 4 kroki do bezpieczniejszej firmy&#8221; opublikowanego [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/","og_site_name":"Upgreat","article_published_time":"2017-04-10T12:16:00+00:00","article_modified_time":"2022-04-19T12:16:42+00:00","author":"ridos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ridos","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/#article","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/"},"author":{"name":"ridos","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101"},"headline":"Warsztaty &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych","datePublished":"2017-04-10T12:16:00+00:00","dateModified":"2022-04-19T12:16:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/"},"wordCount":538,"publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"articleSection":["Aktualno\u015bci"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/","url":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/","name":"Warsztaty - bezpiecze\u0144stwo system\u00f3w informatycznych | Upgreat","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2017-04-10T12:16:00+00:00","dateModified":"2022-04-19T12:16:42+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/blog\/warsztaty-bezpieczenstwo-systemow-informatycznych\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Aktualno\u015bci","item":"https:\/\/www.upgreat.pl\/category\/aktualnosci\/"},{"@type":"ListItem","position":3,"name":"Warsztaty &#8211; bezpiecze\u0144stwo system\u00f3w informatycznych"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101","name":"ridos","sameAs":["https:\/\/www.upgreat.pl"]}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=757"}],"version-history":[{"count":1,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/757\/revisions"}],"predecessor-version":[{"id":758,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/757\/revisions\/758"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/categories?post=757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/tags?post=757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}