{"id":9182,"date":"2026-04-07T00:07:13","date_gmt":"2026-04-06T22:07:13","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=9182"},"modified":"2026-04-07T00:08:53","modified_gmt":"2026-04-06T22:08:53","slug":"expertna_cinnost","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/expertna_cinnost\/","title":{"rendered":"Expertn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 v\u00a0oblasti kybernetickej bezpe\u010dnosti"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9182\" class=\"elementor elementor-9182\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expertn\u00e1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">a odborn\u00e1 \u010dinnos\u0165<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87736eb e-flex e-con-boxed e-con e-parent\" data-id=\"87736eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08e91a9 elementor-widget elementor-widget-text-editor\" data-id=\"08e91a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>A5. <strong>Expertn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 v\u00a0oblasti kybernetickej bezpe\u010dnosti<\/strong><\/h2><p>Cie\u013eom tejto aktivity je poskytovanie odbornej a expertnej podpory org\u00e1nom verejnej spr\u00e1vy pri n\u00e1vrhu, implement\u00e1cii a hodnoten\u00ed bezpe\u010dnostn\u00fdch opatren\u00ed, ako aj pri tvorbe koncep\u010dn\u00fdch a legislat\u00edvnych dokumentov a rie\u0161en\u00ed kybernetick\u00fdch bezpe\u010dnostn\u00fdch incidentov. KC KB UPJ\u0160 v tejto oblasti nadv\u00e4zuje na doteraj\u0161ie sk\u00fasenosti s pr\u00edpravou odborn\u00fdch stanov\u00edsk, technick\u00fdch metod\u00edk a pripomienkovan\u00edm legislat\u00edvy.<\/p><p>\u00a0V\u00a0r\u00e1mci tejto aktivity sa KC KB UPJ\u0160 zameriava na:<\/p><h3><span style=\"color: #ff6600;\">1. Expertn\u00e1 podpora pri rie\u0161en\u00ed kybernetick\u00fdch bezpe\u010dnostn\u00fdch incidentov<\/span><\/h3><p>KC KB UPJ\u0160 poskytuje expertn\u00fa podporu pri rie\u0161en\u00ed kybernetick\u00fdch bezpe\u010dnostn\u00fdch incidentov akreditovan\u00fdm jednotk\u00e1m CSIRT, najm\u00e4 N\u00e1rodn\u00e9mu centru kybernetickej bezpe\u010dnosti SK-CERT a vl\u00e1dnej jednotke CSIRT.SK, ako aj priamo subjektom verejnej spr\u00e1vy. Expertn\u00e1 \u010dinnos\u0165 zah\u0155\u0148a zais\u0165ovanie digit\u00e1lnych st\u00f4p, digit\u00e1lnu forenzn\u00fa anal\u00fdzu, OSINT anal\u00fdzu, identifik\u00e1ciu indik\u00e1torov kompromit\u00e1cie a n\u00e1vrh n\u00e1pravn\u00fdch bezpe\u010dnostn\u00fdch opatren\u00ed. Osobitn\u00fd d\u00f4raz je kladen\u00fd na podporu k\u013e\u00fa\u010dov\u00fdch f\u00e1z rie\u0161enia incidentu, najm\u00e4 containment a eradication. T\u00fato \u010dinnos\u0165 zabezpe\u010duje najm\u00e4 akademick\u00fd bezpe\u010dnostn\u00fd t\u00edm CSIRT-UPJS, ktor\u00fd je akreditovan\u00fdm \u010dlenom komunity TF-CSIRT.<\/p><h3><span style=\"color: #ff6600;\">2. Tvorba odborn\u00fdch stanov\u00edsk a legislat\u00edvnych podkladov<\/span><\/h3><p>KC KB UPJ\u0160 sa akt\u00edvne podie\u013ea na pr\u00edprave odborn\u00fdch stanov\u00edsk, koncep\u010dn\u00fdch materi\u00e1lov a legislat\u00edvnych podkladov v oblasti kybernetickej a informa\u010dnej bezpe\u010dnosti. V\u00fdstupy maj\u00fa podobu metod\u00edk, technick\u00fdch stanov\u00edsk a pr\u00e1vnych anal\u00fdz, ktor\u00e9 podporuj\u00fa implement\u00e1ciu legislat\u00edvnych po\u017eiadaviek v praxi verejnej spr\u00e1vy, napr. v oblasti riadenia bezpe\u010dnosti AI syst\u00e9mov \u010di mana\u017ementu zranite\u013enost\u00ed. KC KB UPJ\u0160 sa z\u00e1rove\u0148 zap\u00e1ja do pripomienkov\u00fdch konan\u00ed k pripravovanej legislat\u00edve a poskytuje odborn\u00e9 n\u00e1vrhy na zlep\u0161enie regula\u010dn\u00e9ho r\u00e1mca.<\/p><h3><span style=\"color: #ff6600;\">3. Particip\u00e1cia na strategick\u00fdch aktivit\u00e1ch v oblasti KIB<\/span><\/h3><p>\u010clenovia KC KB UPJ\u0160 sa podie\u013eaj\u00fa na pr\u00edprave strategick\u00fdch dokumentov na n\u00e1rodnej \u00farovni, najm\u00e4 v oblasti rozvoja v\u00fdskumu, inov\u00e1ci\u00ed a vzdel\u00e1vania v kybernetickej bezpe\u010dnosti. KC KB UPJ\u0160 prispieva k tvorbe koncep\u010dn\u00fdch materi\u00e1lov, ako s\u00fa n\u00e1rodn\u00e9 strat\u00e9gie a ak\u010dn\u00e9 pl\u00e1ny, pri\u010dom reflektuje potrebu prepojenia akademick\u00e9ho v\u00fdskumu, praxe a verejn\u00fdch polit\u00edk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d817e50 elementor-widget elementor-widget-text-editor\" data-id=\"d817e50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>V r\u00e1mci KC KB UPJ\u0160 sa pripravili nasleduj\u00face v\u00fdstupy:<\/p><h4><strong>Vecn\u00e9 pripomienky k n\u00e1vrhu vyhl\u00e1\u0161ky MIRRI SR o bezpe\u010dnostn\u00fdch opatreniach ITVS<\/strong><\/h4><p>Dokument identifikuje k\u013e\u00fa\u010dov\u00e9 nedostatky pripravovanej vyhl\u00e1\u0161ky, najm\u00e4 v oblasti kategoriz\u00e1cie subjektov, rozsahu bezpe\u010dnostn\u00fdch opatren\u00ed a praktickej realizovate\u013enosti po\u017eiadaviek. Navrhuje prechod na rizikovo orientovan\u00fd pr\u00edstup a lep\u0161ie zoh\u013eadnenie re\u00e1lnych potrieb verejnej spr\u00e1vy. S\u00fa\u010das\u0165ou s\u00fa aj odpor\u00fa\u010dania na zos\u00faladenie s medzin\u00e1rodn\u00fdmi \u0161tandardmi a doplnenie oblast\u00ed ako spravodajstvo o\u00a0hrozb\u00e1ch (threat intelligence) \u010di koordinovan\u00e9 zverej\u0148ovanie zranite\u013enost\u00ed (coordinated vulnerability disclosure). Cie\u013eom je zv\u00fd\u0161i\u0165 efekt\u00edvnos\u0165 a aplikovate\u013enos\u0165 regul\u00e1cie v praxi.<\/p><h4><strong>N\u00e1vrh \u00faloh k Ak\u010dn\u00e9mu pl\u00e1nu k N\u00e1rodnej strat\u00e9gii kybernetickej bezpe\u010dnosti 2026 \u2013 2030<\/strong><\/h4><p>Materi\u00e1l obsahuje n\u00e1vrh konkr\u00e9tnych opatren\u00ed zameran\u00fdch najm\u00e4 na rozvoj kapac\u00edt, vzdel\u00e1vania a v\u00fdskumu v oblasti kybernetickej bezpe\u010dnosti. Zd\u00f4raz\u0148uje potrebu systematick\u00e9ho prepojenia akademick\u00e9ho sektora, verejnej spr\u00e1vy a praxe. Navrhuje vyu\u017eitie kompeten\u010dn\u00fdch centier, rozvoj CSIRT kapac\u00edt a podporu praktick\u00e9ho vzdel\u00e1vania. Cie\u013eom je posilni\u0165 odolnos\u0165 SR vo\u010di kybernetick\u00fdm bezpe\u010dnostn\u00fdm hrozb\u00e1m prostredn\u00edctvom rozvoja \u013eudsk\u00fdch zdrojov a koordinovan\u00e9ho ekosyst\u00e9mu.<\/p><h4><strong>Riadenie kybernetickej a informa\u010dnej bezpe\u010dnosti syst\u00e9mov umelej inteligencie v ITVS<\/strong><\/h4><p>Odborn\u00e9 stanovisko poskytuje metodick\u00fd r\u00e1mec pre bezpe\u010dn\u00e9 a pr\u00e1vne konformn\u00e9 vyu\u017e\u00edvanie syst\u00e9mov AI vo verejnej spr\u00e1ve. Zameriava sa na pr\u00e1vne aspekty (GDPR, AI Act), riadenie riz\u00edk a nastavenie intern\u00fdch procesov pri nasadzovan\u00ed syst\u00e9mov AI. Vyu\u017e\u00edva model PDCA na systematick\u00e9 riadenie bezpe\u010dnosti a dop\u013a\u0148a ho o praktick\u00e9 pr\u00edklady a odpor\u00fa\u010dania. Cie\u013eom je zabezpe\u010di\u0165 transparentn\u00e9, zodpovedn\u00e9 a bezpe\u010dn\u00e9 vyu\u017e\u00edvanie syst\u00e9mov AI.<\/p><h4><strong>Technick\u00e9 stanovisko \u2013 deception technol\u00f3gia<\/strong><\/h4><p>Dokument analyzuje vyu\u017eitie deception technol\u00f3gi\u00ed (napr. honeypoty, honeynety, honeytokeny) ako n\u00e1stroja akt\u00edvnej obrany a\u00a0zberu spravodajstva o\u00a0hrozb\u00e1ch (threat intelligence). Popisuje ich klasifik\u00e1ciu, sp\u00f4sob nasadenia a spracovanie z\u00edskan\u00fdch d\u00e1t. Poskytuje odpor\u00fa\u010dania pre implement\u00e1ciu v prostred\u00ed verejnej spr\u00e1vy vr\u00e1tane praktick\u00fdch aspektov a n\u00e1strojov. Cie\u013eom je zv\u00fd\u0161i\u0165 schopnos\u0165 detekcie \u00fatokov a zlep\u0161i\u0165 situa\u010dn\u00e9 povedomie o hrozb\u00e1ch.<\/p><h4><strong>Technick\u00e9 stanovisko \u2013 mana\u017ement zranite\u013enost\u00ed<\/strong><\/h4><p>Materi\u00e1l predstavuje komplexn\u00fa metodiku riadenia bezpe\u010dnostn\u00fdch zranite\u013enost\u00ed v organiz\u00e1ci\u00e1ch verejnej spr\u00e1vy. Popisuje cel\u00fd \u017eivotn\u00fd cyklus od identifik\u00e1cie cez hodnotenie a\u017e po implement\u00e1ciu n\u00e1pravn\u00fdch opatren\u00ed a patch management. Zd\u00f4raz\u0148uje potrebu systematick\u00e9ho, auditovate\u013en\u00e9ho a opakovate\u013en\u00e9ho procesu v s\u00falade s legislat\u00edvou a \u0161tandardmi. Cie\u013eom je zn\u00ed\u017ei\u0165 bezpe\u010dnostn\u00e9 rizik\u00e1 a zv\u00fd\u0161i\u0165 odolnos\u0165 informa\u010dn\u00fdch syst\u00e9mov.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa6293 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6aa6293\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_vecne_pripomienky_navrh_vyhlasky_MIRRI_bezpecnostne_opatrenia.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vecn\u00e9 pripomienky k n\u00e1vrhu vyhl\u00e1\u0161ky MIRRI SR o bezpe\u010dnostn\u00fdch opatreniach ITVS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_odborne_stanovisko_akcny_plan_KB.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00e1vrh \u00faloh k Ak\u010dn\u00e9mu pl\u00e1nu k N\u00e1rodnej strat\u00e9gii kybernetickej bezpe\u010dnosti 2026 \u2013 2030<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_riadenie_AI_ITVS.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Riadenie kybernetickej a informa\u010dnej bezpe\u010dnosti syst\u00e9mov umelej inteligencie v ITVS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_technicke_stanovisko_deception.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Technick\u00e9 stanovisko \u2013 deception technol\u00f3gia<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_technicke_stanovisko_manazment_zranitelnosti.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Technick\u00e9 stanovisko \u2013 mana\u017ement zranite\u013enost\u00ed<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Expertn\u00e1 a odborn\u00e1 \u010dinnos\u0165 A5. Expertn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 v\u00a0oblasti kybernetickej bezpe\u010dnosti Cie\u013eom tejto aktivity je poskytovanie odbornej a expertnej podpory org\u00e1nom verejnej spr\u00e1vy pri n\u00e1vrhu, implement\u00e1cii a hodnoten\u00ed bezpe\u010dnostn\u00fdch opatren\u00ed, ako aj pri tvorbe koncep\u010dn\u00fdch a legislat\u00edvnych dokumentov a rie\u0161en\u00ed kybernetick\u00fdch bezpe\u010dnostn\u00fdch incidentov. KC KB UPJ\u0160 v tejto oblasti nadv\u00e4zuje na doteraj\u0161ie sk\u00fasenosti [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-9182","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=9182"}],"version-history":[{"count":4,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9182\/revisions"}],"predecessor-version":[{"id":9193,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9182\/revisions\/9193"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=9182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}