Polish edition of CYBERSEC.PL

On April 6, 2017 at the PGE Narodowy in Warsaw, the 2nd Polish Cyber ​​Security Forum – CYBERSEC PL 2017, organized by the Kosciuszko Institute will take place. The Polish Internal Security Platform is the Institutional Partner of this event. The participation of people representing public administration and uniformed services, as well as university representatives,

Read more ›

First issue of the “European Cybersecurity Market” quarterly magazine

The Kosciuszko Institute, which organized the yearly CYBERSEC conference that focuses on the problems of cyber security, published the first issue of the “European Cybersecurity Market” quarterly magazine as a part of the CYBERSECHUB project. The magazine is available at the cybersechub website. We encourage you to read it here. Share on facebook Share on

Read more ›

Cyber security – an innovative training module

Protection against cyber attacks is one of the most serious challenges to public administration entities. There is no doubt that effective preparation of institutions and employees to cyber hazards is a huge organizational and financial challenge. According to item 4.2.3 of the draft Poland’s Cyber Security Strategy for the years 2016-2020 which, as announced by

Read more ›

SYGNAL Association – presentation by a PPHS expert

On 21 February 2017, a PPHS expert gave a presentation during a workshop organized by the SYGNAL Association titled “Protection of intellectual property. Selected legal aspects and examples of the best market practices”. The topic of the presentation was Information technology tools supporting the fight against Internet piracy”. The Sygnał Association works to promote respect

Read more ›

A conference on IT security

The Polish Platform for Homeland Security has the honor to invite you to attend the International Conference “When Red meets Blue…” to be held on 24-28 April 2017 in the Pomeranian Science and Technology Park in Gdynia. The conference, organized by x33fcon experts with many years of experience in IT security, is intended both for

Read more ›