Expert

and professional activity

Expert

and professional activity

A5. Expert activities of the KC KB UPJŠ in the field of cybersecurity

The aim of this activity is to provide professional and expert support to public administration bodies in the design, implementation and evaluation of security measures, as well as in the creation of conceptual and legislative documents and solutions to cyber security incidents. In this area, the KC KB UPJŠ builds on its previous experience in preparing expert opinions, technical methodologies and commenting on legislation.

 KC KB UPJŠ focuses on:

1. Expert support in resolving cyber security incidents

The KC KB UPJŠ provides expert support in resolving cyber security incidents to accredited CSIRT units, in particular the National Cyber ​​Security Center SK-CERT and the government unit CSIRT.SK, as well as directly to public administration entities. Expert activities include securing digital traces, digital forensic analysis, OSINT analysis, identification of indicators of compromise and the design of corrective security measures. Special emphasis is placed on supporting the key phases of incident resolution, especially containment and eradication. This activity is mainly provided by the academic security team CSIRT-UPJS, ​​which is an accredited member of the TF-CSIRT community.

2. Creation of expert opinions and legislative documents

KC KB UPJŠ actively participates in the preparation of expert opinions, conceptual materials and legislative documents in the field of cyber and information security. The outputs take the form of methodologies, technical opinions and legal analyses that support the implementation of legislative requirements in public administration practice, e.g. in the field of AI systems security management or vulnerability management. KC KB UPJŠ also participates in commenting procedures on the prepared legislation and provides expert proposals for improving the regulatory framework.

3. Participation in strategic activities in the field of KIB

Members of KC KB UPJŠ participate in the preparation of strategic documents at the national level, especially in the field of development of research, innovation and education in cybersecurity. KC KB UPJŠ contributes to the creation of conceptual materials, such as national strategies and action plans, reflecting the need to connect academic research, practice and public policies.

KC KB UPJŠ has prepared these following outputs:

Substantive comments on the draft MIRRI SR Decree on ITVS security measures

The document identifies key shortcomings of the draft decree, especially in the area of ​​categorization of entities, the scope of security measures and the practical feasibility of requirements. It proposes a transition to a risk-oriented approach and better consideration of the real needs of public administration. It also includes recommendations for harmonization with international standards and the addition of areas such as threat intelligence or coordinated vulnerability disclosure. The aim is to increase the efficiency and applicability of regulation in practice.

Draft tasks for the Action Plan for the National Cybersecurity Strategy 2026 - 2030

The material contains a proposal for specific measures aimed mainly at developing capacities, education and research in the field of cybersecurity. It emphasizes the need for systematic linking of the academic sector, public administration and practice. It proposes the use of competence centers, the development of CSIRT capacities and the support of practical education. The aim is to strengthen the resilience of the Slovak Republic to cyber security threats through the development of human resources and a coordinated ecosystem.

Cyber ​​and information security management of artificial intelligence systems in ITVS

The expert opinion provides a methodological framework for the safe and legally compliant use of AI systems in public administration. It focuses on legal aspects (GDPR, AI Act), risk management and setting up internal processes when deploying AI systems. It uses the PDCA model for systematic security management and supplements it with practical examples and recommendations. The aim is to ensure transparent, responsible and safe use of AI systems.

Technical opinion – deception technology

The document analyses the use of deception technologies (e.g. honeypots, honeynets, honeytokens) as a tool for active defense and threat intelligence collection (threat intelligence). It describes their classification, method of deployment and processing of the obtained data. It provides recommendations for implementation in the public administration environment, including practical aspects and tools. The aim is to increase the ability to detect attacks and improve situational awareness of threats.

Technical opinion - vulnerability management

The material presents a comprehensive methodology for managing security vulnerabilities in public administration organizations. It describes the entire life cycle from identification through assessment to implementation of corrective measures and patch management. It emphasizes the need for a systematic, auditable and repeatable process in accordance with legislation and standards. The aim is to reduce security risks and increase the resilience of information systems.