{"id":5730,"date":"2025-12-09T15:19:57","date_gmt":"2025-12-09T14:19:57","guid":{"rendered":"https:\/\/cloudware.pl\/?p=5730"},"modified":"2026-02-18T15:52:11","modified_gmt":"2026-02-18T14:52:11","slug":"cyberodpornosc2025","status":"publish","type":"post","link":"https:\/\/cloudware.pl\/en\/cyberodpornosc2025\/","title":{"rendered":"Cyberodporno\u015b\u0107 2025+: co po NIS2 i UKSC powinna zrobi\u0107 Twoja organizacja."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5730\" class=\"elementor elementor-5730\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c7a1ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c7a1ee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c33d7b\" data-id=\"7c33d7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa4e278 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa4e278\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bf5d943\" data-id=\"bf5d943\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-596c917 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"596c917\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d362b9\" data-id=\"0d362b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09b5faf elementor-widget elementor-widget-text-editor\" data-id=\"09b5faf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Podczas <\/span><b><span data-contrast=\"auto\">Business Sync Hub<\/span><\/b><span data-contrast=\"auto\"> w jednym panelu prowadzonym przez Tomasza Matu\u0142\u0119, zasiedli przedstawiciele kluczowych graczy rynku: <\/span><b><span data-contrast=\"auto\">Tomasz K\u0119dziora (P4\/Play), Damian Le\u015bniak (Cloudware Polska), Jacek K\u0119dzierski (IBM) i Maciej Przepi\u00f3rka (Dell)<\/span><\/b><span data-contrast=\"auto\">. Temat by\u0142 wymagaj\u0105cy: \u201eCyberodporno\u015b\u0107 2025+: NIS2, nowelizacja UKSC i przysz\u0142o\u015b\u0107 bezpiecze\u0144stwa organizacji\u201d. Zamiast powiela\u0107 slogany o cyberbezpiecze\u0144stwie, panel skupi\u0142 si\u0119 na praktyce: co naprawd\u0119 trzeba zrobi\u0107, aby organizacja by\u0142a bardziej odporna na ataki.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p aria-level=\"2\"><b><span data-contrast=\"none\">NIS2 i UKSC: mniej \u201epapieru\u201d, wi\u0119cej realnej odpowiedzialno\u015bci<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Tomasz K\u0119dziora, odpowiadaj\u0105cy za cyberbezpiecze\u0144stwo u jednego z najwi\u0119kszych operator\u00f3w telekomunikacyjnych w Polsce, zwr\u00f3ci\u0142 uwag\u0119, \u017ce wieloletnia \u201eepopeja\u201d wok\u00f3\u0142 nowelizacji ustawy o krajowym systemie cyberbezpiecze\u0144stwa zm\u0119czy\u0142a wiele firm. Ponadto zapisy o <\/span><b><span data-contrast=\"auto\">karach, sankcjach i osobistej odpowiedzialno\u015bci cz\u0142onk\u00f3w zarz\u0105d\u00f3w sprawi\u0142y, \u017ce<\/span><\/b><span data-contrast=\"auto\">, temat nabra\u0142 realnej wagi r\u00f3wnie\u017c w salach zarz\u0105d\u00f3w.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">W praktyce oznacza to, \u017ce:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"34\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">cz\u0142onkowie zarz\u0105du mog\u0105 ponosi\u0107 osobiste konsekwencje za zaniedbania w obszarze cyberbezpiecze\u0144stwa,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"34\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">regulator zyskuje narz\u0119dzia nie tylko do nak\u0142adania kar finansowych, ale tak\u017ce do ingerencji w sk\u0142ad w\u0142adz sp\u00f3\u0142ek,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"34\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">wymagania (np. system zarz\u0105dzania bezpiecze\u0144stwem informacji, rejestr aktyw\u00f3w, analiza ryzyka, zapewnienie ci\u0105g\u0142o\u015bci dzia\u0142ania) przestaj\u0105 by\u0107 \u201eopcj\u0105\u201d.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Tomasz podkre\u015bli\u0142, \u017ce firma, dla kt\u00f3rej pracuje nie traktuje tych wymaga\u0144 jako \u201eodfajkowania ustawy\u201d, ale jako okazj\u0119 do spojrzenia w lustro: analizy w\u0142asnych incydent\u00f3w, incydent\u00f3w u konkurencji i g\u0142o\u015bnych przypadk\u00f3w z rynku. Na tej podstawie buduj\u0105 <\/span><b><span data-contrast=\"auto\">rejestr aktyw\u00f3w i us\u0142ug, przegl\u0105daj\u0105 podatno\u015bci, rejestry incydent\u00f3w, procedury reakcji<\/span><\/b><span data-contrast=\"auto\"> i, co wa\u017cne, sprawdzaj\u0105, czy dzi\u0119ki wdro\u017conym \u015brodkom bezpiecze\u0144stwa potrafi\u0105 zauwa\u017cy\u0107, \u017ce co\u015b podejrzanego si\u0119 dzieje.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p aria-level=\"2\"><b><span data-contrast=\"none\">Szkolenia i testy: od nudnych prezentacji do realnych \u0107wicze\u0144<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Jednym z najmocniejszych w\u0105tk\u00f3w panelu by\u0142a zmiana podej\u015bcia do <\/span><b><span data-contrast=\"auto\">szkole\u0144 i testowania u\u017cytkownik\u00f3w<\/span><\/b><span data-contrast=\"auto\">. Zamiast kolejnej, \u201eodhaczonej\u201d prezentacji e<\/span><span data-contrast=\"auto\">\u2011<\/span><span data-contrast=\"auto\">learningowej, firma zacz\u0119\u0142a:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">opowiada\u0107 o <\/span><b><span data-contrast=\"auto\">w\u0142asnych incydentach<\/span><\/b><span data-contrast=\"auto\"> (oczywi\u015bcie w formie bezpiecznej dla organizacji),<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">organizowa\u0107 kr\u00f3tkie sesje Q&amp;A dla pracownik\u00f3w,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">prowadzi\u0107 akcje testowe, np. wysy\u0142k\u0119 \u201epodejrzanych\u201d wiadomo\u015bci do wybranej grupy i analiz\u0119 reakcji.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Z prostego testu &#8211; wys\u0142ania maila z danymi do logowania do grupy pracownik\u00f3w &#8211; mo\u017cna w kilka godzin zobaczy\u0107, ilu z nich zg\u0142osi podejrzan\u0105 wiadomo\u015b\u0107, a ilu spr\u00f3buje si\u0119 zalogowa\u0107. To bardzo czytelny barometr poziomu \u015bwiadomo\u015bci w organizacji.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Podobne kampanie, w tym testy phishingowe dla kadry mened\u017cerskiej, opisywa\u0142 Jacek K\u0119dzierski z IBM. Wa\u017cne by\u0142o nie tylko samo badanie, ale r\u00f3wnie\u017c <\/span><b><span data-contrast=\"auto\">szczery feedback<\/span><\/b><span data-contrast=\"auto\"> omawiany na spotkaniach kierownictwa. Taki dialog sprawia, \u017ce cyberbezpiecze\u0144stwo przestaje by\u0107 \u201espraw\u0105 IT\u201d, a staje si\u0119 tematem kultury organizacyjnej.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p aria-level=\"2\"><b><span data-contrast=\"none\">Producenci bior\u0105 odpowiedzialno\u015b\u0107: \u201ebezpieczne od fabryki\u201d<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Z perspektywy producenta sprz\u0119tu i rozwi\u0105za\u0144 pami\u0119ci masowych g\u0142os zabra\u0142 Maciej Przepi\u00f3rka z Dell. Z bada\u0144, kt\u00f3re przytoczy\u0142, wynika, \u017ce <\/span><b><span data-contrast=\"auto\">dla 72% klient\u00f3w technologie ochrony danych s\u0105 dzi\u015b priorytetowe<\/span><\/b><span data-contrast=\"auto\"> \u2013 wy\u017cej ni\u017c wydajno\u015b\u0107 czy \u0142atwo\u015b\u0107 zarz\u0105dzania. W odpowiedzi na to oczekiwanie duzi producenci wbudowuj\u0105 cyberodporno\u015b\u0107 w rozwi\u0105zania \u201eod fabryki\u201d.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">W praktyce oznacza to:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"29\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">certyfikacj\u0119 fabryk i komponent\u00f3w,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"29\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">\u0142a\u0144cuch zaufania (root of trust, secure boot chain of trust)<\/span><\/b><span data-contrast=\"auto\"> &#8211; ka\u017cdy komponent jest cyfrowo podpisany, a pr\u00f3ba podmiany uniemo\u017cliwia uruchomienie urz\u0105dzenia,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"29\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">szyfrowanie danych, rotacj\u0119 kluczy, nieusuwalne snapshoty,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"29\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">mechanizmy bezpiecznego kasowania danych oraz <\/span><b><span data-contrast=\"auto\">cyber bunkry<\/span><\/b><span data-contrast=\"auto\"> &#8211; odizolowane \u015brodowiska, do kt\u00f3rych dane replikowane s\u0105 w kontrolowany spos\u00f3b.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">IBM, o kt\u00f3rym m\u00f3wi\u0142 Jacek K\u0119dzierski, idzie o krok dalej, projektuj\u0105c i kontroluj\u0105c produkty \u201eod procesora po wirtualizator\u201d. Dzi\u0119ki temu mo\u017ce bra\u0107 pe\u0142niejsz\u0105 odpowiedzialno\u015b\u0107 za bezpiecze\u0144stwo \u015brodowiska, pod warunkiem, \u017ce klient stosuje si\u0119 do rekomendowanych procedur.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p aria-level=\"2\"><b><span data-contrast=\"none\">Ci\u0105g\u0142o\u015b\u0107 dzia\u0142ania: lokalnie, w chmurze czy\u2026 w kontenerze?<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Damian Le\u015bniak z Cloudware Polska zwr\u00f3ci\u0142 uwag\u0119 na temat <\/span><b><span data-contrast=\"auto\">ci\u0105g\u0142o\u015bci dzia\u0142ania<\/span><\/b><span data-contrast=\"auto\"> &#8211; cz\u0119sto pomijany, dop\u00f3ki co\u015b si\u0119 nie wydarzy. Klasyczne, lokalne data center daje poczucie kontroli i blisko\u015bci danych, ale jedna lokalizacja to zawsze ryzyko po\u017caru, zalania czy awarii zasilania. Budowa drugiego data center to z kolei ogromne koszty.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Z drugiej strony pe\u0142na migracja do chmury oddaje dane w r\u0119ce globalnych dostawc\u00f3w, z ich procedurami i bezpiecze\u0144stwem, ale cz\u0119sto bez pe\u0142nej przejrzysto\u015bci, gdzie fizycznie znajduj\u0105 si\u0119 dane.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Ciekaw\u0105 \u201etrzeci\u0105 drog\u0105\u201d s\u0105 <\/span><b><span data-contrast=\"auto\">mobilne, modu\u0142owe centra danych (kontenerowe data center)<\/span><\/b><span data-contrast=\"auto\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">mo\u017cna je relokowa\u0107 w razie potrzeby,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">daj\u0105 mo\u017cliwo\u015b\u0107 budowy prywatnej chmury z pe\u0142n\u0105 kontrol\u0105 nad lokalizacj\u0105 danych,<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">pozwalaj\u0105 zapewni\u0107 redundancj\u0119 i szybkie przywracanie dzia\u0142ania, gdy stacjonarne centrum przestanie dzia\u0142a\u0107.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Damian podkre\u015bli\u0142, \u017ce ci\u0105g\u0142o\u015b\u0107 dzia\u0142ania to nie tylko wielkie katastrofy. Cz\u0119sto wystarczy awaria fragmentu infrastruktury lub transformatora, by firma stan\u0119\u0142a. Kluczowe jest wi\u0119c nie tylko posiadanie plan\u00f3w B i C, ale tak\u017ce <\/span><b><span data-contrast=\"auto\">regularne \u0107wiczenie scenariuszy<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p aria-level=\"2\"><b><span data-contrast=\"none\">Jedna rekomendacja na 2026 rok od ka\u017cdego z ekspert\u00f3w<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Na koniec panelu prowadz\u0105cy poprosi\u0142 ka\u017cdego z prelegent\u00f3w o jedn\u0105, konkretn\u0105 rekomendacj\u0119 na kolejne lata:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Tomasz K\u0119dziora (P4\/Play)<\/span><\/b>\u00a0<br \/><span data-contrast=\"auto\">Przeprowadzi\u0107 przynajmniej jeden, w miar\u0119 szeroki test odtworzenia ci\u0105g\u0142o\u015bci dzia\u0142ania kluczowej us\u0142ugi \/ procesu w ramach podnoszenia \u015bwiadomo\u015bci pracownik\u00f3w na cyber<\/span> <span data-contrast=\"auto\">zagro\u017cenia i zobaczy\u0107, jak reaguj\u0105 pracownicy na zaistnia\u0142\u0105 sytuacj\u0119 i czy potrafi\u0105 realizowa\u0107 zadania w celu przywr\u00f3cenia us\u0142ugi \/ procesu. Utrzyma\u0107 spok\u00f3j mimo nat\u0142oku informacji o atakach, ale przyj\u0105\u0107, \u017ce \u201eco\u015b\u201d kiedy\u015b si\u0119 wydarzy r\u00f3wnie\u017c u nas i stara\u0107 si\u0119 dzia\u0142a\u0107 z wyprzedzeniem.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Maciej Przepi\u00f3rka (Dell)<\/span><\/b>\u00a0<br \/><span data-contrast=\"auto\">Budowa\u0107 rozwi\u0105zania w duchu <\/span><b><span data-contrast=\"auto\">zero trust<\/span><\/b><span data-contrast=\"auto\"> i dba\u0107 o bezpiecze\u0144stwo przez ca\u0142y cykl \u017cycia produktu. R\u00f3wnolegle prowadzi\u0107 regularne testy u\u017cytkownik\u00f3w, bo technologia bez \u015bwiadomego cz\u0142owieka niewiele zmieni.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Damian Le\u015bniak (Cloudware Polska)<\/span><\/b>\u00a0<br \/><span data-contrast=\"auto\">Postawi\u0107 na <\/span><b><span data-contrast=\"auto\">szkolenia i \u0107wiczenia<\/span><\/b><span data-contrast=\"auto\"> dla pracownik\u00f3w i zarz\u0105d\u00f3w. Integratorzy i dostawcy powinni przychodzi\u0107 z gotowymi scenariuszami, a po ka\u017cdym te\u015bcie dawa\u0107 pracownikom konkretny feedback.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Jacek K\u0119dzierski (IBM)<\/span><\/b>\u00a0<br \/><span data-contrast=\"auto\">Ju\u017c dzi\u015b my\u015ble\u0107 o <\/span><b><span data-contrast=\"auto\">post<\/span><\/b><b><span data-contrast=\"auto\">\u2011<\/span><\/b><b><span data-contrast=\"auto\">quantum security<\/span><\/b><span data-contrast=\"auto\">. Dane wykradzione teraz mog\u0105 zosta\u0107 odszyfrowane za kilka lat, gdy komputery kwantowe dojrzej\u0105. Warto ju\u017c teraz korzysta\u0107 z rozwi\u0105za\u0144 odpornych na przysz\u0142e ataki.<\/span>\u00a0<br \/><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Wsp\u00f3lny mianownik? Cyberodporno\u015b\u0107 to nie \u201eprodukt\u201d, kt\u00f3ry mo\u017cna kupi\u0107 jedn\u0105 faktur\u0105. To kombinacja rozs\u0105dnej interpretacji regulacji, \u015bwiadomych zarz\u0105d\u00f3w, dojrza\u0142ych dostawc\u00f3w i dobrze przygotowanych ludzi po obu stronach.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Podczas Business Sync Hub w jednym panelu prowadzonym przez Tomasza Matu\u0142\u0119, zasiedli przedstawiciele kluczowych graczy rynku: Tomasz K\u0119dziora (P4\/Play), Damian Le\u015bniak (Cloudware Polska), Jacek K\u0119dzierski (IBM) i Maciej Przepi\u00f3rka (Dell). Temat by\u0142 wymagaj\u0105cy: \u201eCyberodporno\u015b\u0107 2025+: NIS2, nowelizacja UKSC i przysz\u0142o\u015b\u0107 bezpiecze\u0144stwa organizacji\u201d. Zamiast powiela\u0107 slogany o cyberbezpiecze\u0144stwie, panel skupi\u0142 si\u0119 na praktyce: co naprawd\u0119 trzeba [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5732,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[57,35,58],"class_list":["post-5730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-business-sync-hub","tag-cloudware","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts\/5730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/comments?post=5730"}],"version-history":[{"count":4,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts\/5730\/revisions"}],"predecessor-version":[{"id":5735,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts\/5730\/revisions\/5735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/media\/5732"}],"wp:attachment":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/media?parent=5730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/categories?post=5730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/tags?post=5730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}