đPatch Management & KonfigurĂĄciĂłs MegfelelĆsĂ©g: Kritikus a BiztonsĂĄgos IT-hez /ENG below A rendszeres patching Ă©s a konfigurĂĄciĂłs megfelelĆsĂ©g alapvetĆ az IT biztonsĂĄg Ă©s stabilitĂĄs szempontjĂĄbĂłl. MiĂ©rt fontos? - Csökkenti a sebezhetĆsĂ©geket. - SegĂt megfelelni az iparĂĄgi szabvĂĄnyoknak (ISO 27001, NIST, GDPR). - Növeli a rendszerek stabilitĂĄsĂĄt, kevesebb hibĂĄt Ă©s leĂĄllĂĄst okoz. Legjobb gyakorlatok: 1ïžâŁ AutomatizĂĄlt patch menedzsment. 2ïžâŁ Rendszeres auditok a konfigurĂĄciĂłk ellenĆrzĂ©sĂ©re. 3ïžâŁ Kritikus rendszerek prioritĂĄsa. 4ïžâŁ DokumentĂĄlt Ă©s ismĂ©telhetĆ folyamatok a compliance-hez. A patch management Ă©s a konfigurĂĄciĂłs megfelelĆsĂ©g egyĂŒtt a biztonsĂĄgos IT mƱködĂ©s alapja. / đ Patch Management & Configuration Compliance: Critical for Secure IT Regular patching and configuration compliance are essential for IT security and stability. Why it matters: - Reduces vulnerabilities. - Helps meet industry standards (ISO 27001, NIST, GDPR). - Increases system stability, minimizing errors and downtime. Best practices: 1ïžâŁ Automated patch management. 2ïžâŁ Regular audits to check configurations. 3ïžâŁ Prioritizing critical systems. 4ïžâŁ Documented and repeatable processes for compliance. Together, patch management and configuration compliance form the foundation of secure IT operations. #CyberSecurity #ITCompliance #PatchManagement #ConfigurationManagement #ITSecurity #RiskManagement
RĂłlunk
ACPM provides IT consulting services to major corporations, financial entities and government organizations. Our focus IT SECURITY and BUSINESS INTELLIGENCE consultancy. We also have more than 20 years of experience in IT PROJECT MANAGEMENT and IT AUDIT.
- Weboldal
-
http://www.acpmit.com
KĂŒlsĆ hivatkozĂĄs a következĆhöz: ACPM IT Consulting Ltd.
- Ăgazat
- IT Services and IT Consulting
- Vållalat mérete
- 11â50 munkavĂĄllalĂł
- Központ
- Budapest
- TĂpus
- Public Company
- AlapĂtva
- 2015
- SzakterĂŒletek
Helyek
-
ElsĆdleges
Get directions
Széchenyi Istvån tér 7
Budapest, 1051, HU
Alkalmazottak a ACPM IT Consulting Ltd.
FrissĂtĂ©sek
-
đ Micro-learning -Â Zero Trust #CyberSecurity #szerotrust #MicroLearning #TeamAwareness
-
-
đ€ Erdei Csaba, az ACPM IT Zrt. ĂŒgyvezetĆje moderĂĄlta az idei INFOTĂR konferencia egyik kiemelt kerekasztalĂĄt: âKibervĂ©delem Ă©s digitĂĄlis pĂ©nzpiacok. Az alternatĂv szolgĂĄltatĂłk vajon lehetĆsĂ©get vagy veszĂ©lyt jelentenek?â KöszönjĂŒk a gondolatĂ©bresztĆ felvezetĆ elĆadĂĄsokat dr. Greinstetter BalĂĄzs (DigitalizĂĄciĂłs igazgatĂłsĂĄg, MNB) Ă©s DudĂĄs MĂĄtĂ© (Check Point Software Technologies) elĆadĂłktĂłl, valamint a panel szakĂ©rtĆinek: OlĂĄh IstvĂĄn (HTE-EIVOK), HalĂĄsz Viktor (KĂ©szenlĂ©ti RendĆrsĂ©g Nemzeti NyomozĂł Iroda KiberbƱnözĂ©s FĆosztĂĄly), LencsĂ©s GĂĄbor (NMHH), Farkas PĂ©ter (biztributor). đ Program Ă©s rĂ©szletek: https://lnkd.in/eVcb9UBH #INFOTĂR #kibervĂ©delem #digitĂĄlispĂ©nzpiacok #fintech #cybersecurity #ACPMIT Csaba Erdei, INFOTĂR
-
-
đż Nagy örömmel vettĂŒnk rĂ©szt az idei WITSEC konferenciĂĄn az ACPM IT Zrt. csapatĂĄval! InspirĂĄlĂł napot tölthettĂŒnk el a kiberbiztonsĂĄg irĂĄnt elkötelezett szakemberek között, Ă©rtĂ©kes beszĂ©lgetĂ©sekkel Ă©s Ășj kapcsolatokkal gazdagodva. StandunknĂĄl a lĂĄtogatĂłk egy kis jĂĄtĂ©kban â a Fortified Cyber Arena kihĂvĂĄsban â prĂłbĂĄlhattĂĄk ki magukat, ahol a sikeres megoldĂĄsĂ©rt cserepes fƱszernövĂ©nyeket vihettek haza đ±. Nagy öröm volt lĂĄtni, mennyi lelkes rĂ©sztvevĆ kapcsolĂłdott be, Ă©s milyen jĂł hangulat alakult ki! đ€ KĂŒlön bĂŒszkĂ©k vagyunk Kristina Variash kollĂ©ganĆnkre, aki âWhen AI Becomes the Attacker: Defending Against Intelligent Cyber Threatsâ cĂmƱ elĆadĂĄsĂĄban az AI-alapĂș kibertĂĄmadĂĄsok Ășj korszakĂĄrĂłl beszĂ©lt. ElĆadĂĄsĂĄban bemutatta, hogyan vĂĄlik a mestersĂ©ges intelligencia nemcsak a vĂ©dekezĂ©s, hanem a tĂĄmadĂĄs eszközĂ©vĂ© is â Ă©s mikĂ©nt kell a kiberbiztonsĂĄgi szakembereknek proaktĂvan reagĂĄlni az intelligens, adaptĂv fenyegetĂ©sekre. Kristina valĂłs pĂ©ldĂĄkon keresztĂŒl mutatta be a megelĆzĂ©s, detektĂĄlĂĄs Ă©s reziliencia fejlesztĂ©sĂ©nek Ășj megközelĂtĂ©seit, segĂtve a szakmĂĄt felkĂ©szĂŒlni a következĆ generĂĄciĂłs kihĂvĂĄsokra. đ©đ»âš #TeamACPM WITSEC #WITSEC #SzakmaiNap #Cybersecurity Marton Miklos, Andrea Balogh, Döniz Simon, Judit Kaczur, Luca Hanna BorbĂ©ly, Patrik Neubauer dr. LL.M., Zsuzsanna Szalai , Csaba Sandor Varga
-
-
đ§đ±ïž Mic-E-Mouse /ENG Below A nagy teljesĂtmĂ©nyƱ optikai szenzorral felszerelt egerek kĂ©pesek akusztikus rezgĂ©sek Ă©rzĂ©kelĂ©sĂ©re â Ă©s ezzel akĂĄr beszĂ©dinformĂĄciĂłk rekonstruĂĄlĂĄsĂĄra is. đ A kutatĂłk egy olyan tĂĄmadĂĄsi lĂĄncot mutattak be, amely: - a felhasznĂĄlĂł munkafelĂŒletĂ©n terjedĆ rezgĂ©sekbĆl nyer ki adatokat, - gĂ©pi tanulĂĄssal javĂtja a torz, kvantĂĄlt jeleket, - Ă©s akĂĄr 80%-os pontossĂĄggal kĂ©pes beszĂ©lĆt azonosĂtani. đź A tĂĄmadĂĄs kĂŒlönösen kreatĂv szoftverekben Ă©s videojĂĄtĂ©kokban rejtĆzhet el, ahol a magas frekvenciĂĄjĂș egĂ©radatok gyƱjtĂ©se nem gyanĂșs. đĄ MiĂ©rt fontos ez AI governance szempontbĂłl? - A perifĂ©riĂĄk biztonsĂĄga gyakran kimarad a szabĂĄlyozĂĄsi keretekbĆl. - A Mic-E-Mouse esettanulmĂĄny jĂłl pĂ©ldĂĄzza, hogyan vĂĄlhat egy ĂĄrtalmatlannak tƱnĆ eszköz az adatgyƱjtĂ©s eszközĂ©vĂ©. - SĂŒrgeti a hardveres Ă©s szoftveres auditok kiterjesztĂ©sĂ©t â nemcsak a központi rendszerekre, hanem a teljes ökoszisztĂ©mĂĄra. đŹ Te mit gondolsz? Helyet kell kapnia a perifĂ©riĂĄk biztonsĂĄgĂĄnak az AI szabĂĄlyozĂĄsi keretrendszerekben? / đ§đ±ïžMic-E-Mouse The Mic-E-Mouse research highlights a surprisingly underrated risk: high-performance optical sensors in computer mice can detect acoustic vibrations â and potentially reconstruct elements of human speech. đ The researchers demonstrated an attack chain that: - extracts data from vibrations transmitted through the userâs desk surface, - uses machine learning to enhance distorted, quantized signals, - and can identify speakers with up to 80% accuracy. đź The attack can be cleverly hidden in creative software or video games, where collecting high-frequency mouse data is not considered suspicious. đĄ Why does this matter for AI governance? - Peripheral security is often overlooked in regulatory frameworks. - The Mic-E-Mouse case study illustrates how seemingly harmless devices can become tools for data extraction. - It calls for expanding hardware and software audits â not only for core systems, but across the entire ecosystem. đŹ What do you think? Should peripheral security be part of AI regulatory frameworks? #Cybersecurity #AIgovernance #MicEMouse #PrivacyByDesign #PeripheralSecurity #DataProtection #Research
-
đ Mi szĂĄmĂt mestersĂ©ges intelligencia rendszernek az EU AI Act szerint?/ENG below Sokszor halljuk a kĂ©rdĂ©st: mi szĂĄmĂt valĂłjĂĄban mestersĂ©ges intelligenciĂĄnak az EU Ășj AI Act szerint? A vĂĄlasz nem is olyan egyszerƱ, hiszen nem minden âokosâ szoftver MI-rendszer. Az MI-rendszer (AI system) egy olyan gĂ©palapĂș rendszer, amely âĄïž bemeneteket fogad (adatokat, utasĂtĂĄsokat), âĄïž inferencia â azaz következtetĂ©s â rĂ©vĂ©n feldolgozza ezeket, âĄïž majd kimeneteket ad (pl. elĆrejelzĂ©s, tartalom, ajĂĄnlĂĄs, döntĂ©s), amelyek befolyĂĄsolhatjĂĄk a fizikai vagy digitĂĄlis környezetet. Az MI-rendszerek kĂŒlönbözĆ technikĂĄkon alapulhatnak, pĂ©ldĂĄul: đ§ gĂ©pi tanulĂĄs (machine learning â pl. kĂ©pfelismerĂ©s, szövegelemzĂ©s), âïž logikai Ă©s tudĂĄsalapĂș megközelĂtĂ©sek (pl. szabĂĄlyalapĂș döntĂ©stĂĄmogatĂĄs). Fontos: nem minden szoftver szĂĄmĂt MI-nek. Az AI Act szerint csak az tekinthetĆ mestersĂ©ges intelligenciĂĄnak, amely önĂĄllĂł következtetĂ©sre kĂ©pes, nem pedig pusztĂĄn elĆre beprogramozott utasĂtĂĄsokat hajt vĂ©gre. Az MI fogalma tehĂĄt szĂ©les, de nem korlĂĄtlan: a jogalkotĂł cĂ©lja, hogy lefedje a modern, adaptĂv technolĂłgiĂĄkat, miközben vilĂĄgos kĂŒlönbsĂ©get tesz a hagyomĂĄnyos szoftverekkel szemben. / What counts as an Artificial Intelligence system under the EU AI Act? We often hear the question: what actually qualifies as artificial intelligence under the EUâs new AI Act? The answer isnât that simple â not every âsmartâ software is an AI system. An AI system is a machine-based system that âĄïž receives inputs (data, instructions), âĄïž processes them through inference, and âĄïž produces outputs (e.g. prediction, content, recommendation, decision) that can influence the physical or digital environment. AI systems can be based on various techniques, such as: đ§ machine learning (e.g. image recognition, text analysis), âïž logic- and knowledge-based approaches (e.g. rule-based decision support). Important: not every software is considered AI. According to the AI Act, only systems capable of autonomous inference qualify as artificial intelligence â not those that merely execute pre-programmed instructions. The concept of AI is therefore broad, but not unlimited: the legislatorâs goal was to cover modern, adaptive technologies while clearly distinguishing them from traditional software. #AIAct #MestersĂ©gesIntelligencia #AI #EUrendelet #ACPM #AIszabĂĄlyozĂĄs
-
đȘĂrömmel jelentjĂŒk, hogy Kristina Variash, az ACPM IT Zrt. Cybersecurity Project Menedzsere elĆadĂĄst tart a WITSEC Szakmai Nap 2025 rendezvĂ©nyen, oktĂłber 28-ĂĄn! đ https://lnkd.in/dE2M8cQK đ ElĆadĂĄs cĂme: When AI Becomes the Attacker â Defending Against Intelligent Cyber Threats Az elĆadĂĄs közĂ©ppontjĂĄban az a jelensĂ©g ĂĄll, hogy a mestersĂ©ges intelligencia nemcsak a kiberbiztonsĂĄg hatĂ©kony vĂ©delmi eszközekĂ©nt jelenik meg, hanem Ășj tĂpusĂș fenyegetĂ©skĂ©nt is. Kristina bemutatja, hogyan mƱködnek az AI ĂĄltal vezĂ©relt tĂĄmadĂĄsok, miĂ©rt vallanak kudarcot a hagyomĂĄnyos vĂ©delmi mechanizmusok, Ă©s milyen innovatĂv stratĂ©giĂĄkkal kĂ©szĂŒlhetnek fel a szervezetek az intelligens kiberfenyegetĂ©sekkel szemben. đ HelyszĂn: Magyar Telekom SzĂ©khĂĄz, Budapest đ DĂĄtum: 2025. oktĂłber 28. đïž RĂ©szvĂ©tel ingyenes, de regisztrĂĄciĂłhoz kötött đŹđ§Weâre proud to share that Kristina Variash, Cybersecurity Project Manager at ACPM IT Zrt., will be speaking at the WITSEC Professional Day 2025 on October 28th! đ https://lnkd.in/dE2M8cQK đ Talk title: When AI Becomes the Attacker â Defending Against Intelligent Cyber Threats Artificial intelligence is reshaping the cybersecurity landscape â not only as a powerful defense tool but also as a new and evolving threat. In her talk, Kristina will explore how AI-driven attacks operate, why traditional defenses fail, and what innovative strategies can help organizations build resilience against intelligent cyber threats. đ Location: Magyar Telekom Headquarters, Budapest đ Date: October 28, 2025 đïž Free entry, registration required #CyberSecurity WITSEC #AI #ArtificialIntelligence #KiberbiztonsĂĄg #ACPMIT Kristina Variash , Marton Miklos
đ đȘđđ§đŠđđ đđđźđžđșđźđ¶ đ»đźđœđŒđ»: đ€Variash Kristina: When AI Becomes the Attacker: Defending Against Intelligent Cyber Threats As artificial intelligence becomes increasingly integrated into cybersecurity systems, it is also emerging as a powerful tool for attackers. AI-driven threats can adapt, learn, and exploit vulnerabilities faster than traditional methods, posing unprecedented challenges to defense mechanisms. This presentation explores the evolving landscape of intelligent cyber threats, showcasing real-world examples of AI-enabled attacks and discussing proactive strategies for detection, prevention, and resilience. By understanding how AI can both protect and endanger digital infrastructures, we can better prepare for the next generation of cybersecurity challenges. đKristina Variash is a Cybersecurity Project Manager at ACPM IT Consulting Ltd., where she successfully leads complex international cybersecurity projects, including initiatives across the MENA region. Her ability to navigate the technical and logistical challenges of this global field is grounded in her robust academic background, which includes a Bachelor's degree in Electrical Engineering and her current pursuit of a Master's in Computer Science at Ăbuda University. This potent combination of technical knowledge and project management discipline is further complemented by her experience in university administration at Ăbuda, where she serves as an Assistant to the Vice Rector, blending strategic oversight with an understanding of international academic collaboration. In addition to her administrative and research responsibilities, she also teaches Entrepreneurship at the university, fostering innovation and practical business thinking among students. đĄAz elĆadĂĄs nyelve angol. đA szakmai nap programja Ă©s rĂ©szletei: https://lnkd.in/dE2M8cQK
-
-
ProaktĂv Cybersecurity Audit & Compliance đ /ENG below A kiberfenyegetĂ©sek folyamatosan vĂĄltoznak, Ă©s a hagyomĂĄnyos, Ă©ves auditok mĂĄr nem mindig elegendĆek. A proaktĂv audit Ă©s compliance lehetĆvĂ© teszi, hogy a szervezet ne csak reagĂĄljon, hanem megelĆzze a problĂ©mĂĄkat, mielĆtt azok ĂŒzleti kĂĄrokat okoznĂĄnak. MiĂ©rt Ă©rdemes proaktĂvan hozzĂĄĂĄllni? đKorai kockĂĄzatfelismerĂ©s â azonosĂtsd a gyenge pontokat a rendszereidben, folyamatokban Ă©s emberi tĂ©nyezĆkben, mielĆtt tĂĄmadĂłk kihasznĂĄlnĂĄk Ćket. đFolyamatos folyamatfejlesztĂ©s â a compliance Ă©s audit nem egyszeri esemĂ©ny, hanem eszköz a vĂ©delmi intĂ©zkedĂ©sek folyamatos javĂtĂĄsĂĄhoz. đ€Növelt partner- Ă©s ĂŒgyfĂ©lbizalom â bizonyĂtsd, hogy a szervezeted biztonsĂĄgos Ă©s elĆrelĂĄtĂł, Ăgy erĆsĂtve ĂŒzleti kapcsolataidat. đ°KöltsĂ©ghatĂ©konysĂĄg â a problĂ©mĂĄk korai felismerĂ©se Ă©s kezelĂ©se sokkal olcsĂłbb, mint a incidensek utĂłlagos orvoslĂĄsa. đĄ Tipp: tekintsd a cybersecurity compliance-t Ă©s auditot folyamatos ĂŒzleti eszköznek, nem pusztĂĄn Ă©ves kötelezettsĂ©gnek. Ez a stratĂ©giai hozzĂĄĂĄllĂĄs segĂt megelĆzni a kiberincidenseket Ă©s erĆsĂteni a szervezet biztonsĂĄgi kultĂșrĂĄjĂĄt. / Proactive Cybersecurity Audit & Compliance đ Cyber threats are constantly evolving, and traditional annual audits are no longer always enough. Proactive audit and compliance allow organizations not just to react, but to prevent issues before they cause business impact. Why take a proactive approach? đ Early risk detection â identify weak points in your systems, processes, and human factors before attackers exploit them. đ Continuous process improvement â compliance and audits are not one-time events, but tools to continuously strengthen security measures. đ€ Increased partner and client trust â demonstrate that your organization is secure and forward-thinking, enhancing business relationships. đ° Cost efficiency â detecting and addressing issues early is much cheaper than dealing with incidents afterward. đĄ Tip: Treat cybersecurity compliance and audits as ongoing business enablers, not just annual obligations. This strategic approach helps prevent cyber incidents and strengthens your organizationâs security culture. #CyberSecurity #ProactiveAudit #Compliance #RiskManagement #InfoSec #ContinuousImprovement
-
Beyondâtheânetwork â amikor a tĂĄmadĂĄs nem a hĂĄlĂłzaton kezdĆdik đ§/ENG below A valĂłs kockĂĄzatok gyakran a hĂĄlĂłzaton tĂșlrĂłl jönnek. A beyondâtheânetwork tĂĄmadĂĄsok fizikai Ă©s emberi vektorokon keresztĂŒl hatolnak be. đąFizikai hozzĂĄfĂ©rĂ©s â belĂ©pĆk kijĂĄtszĂĄsa, tailgating, belĂ©ptetĆrendszerek Ă©s zĂĄrak kijĂĄtszĂĄsa. đEszközkompromittĂĄlĂĄs â USB/egĂ©r/nyomtatĂł fertĆzĂ©sek, kompromittĂĄlt IoT Ă©s OT eszközök. đĄRogue hĂĄlĂłzatok & eszközök â hamis WiâFi, rogue AP-k, kompromittĂĄlt kĂŒlsĆ eszközök. đSupplyâchain Ă©s thirdâparty vektorok â beszĂĄllĂtĂłk vagy karbantartĂłk ĂștjĂĄn bejutĂĄs. đ”ïžâïžSocial engineering offline â hamis belĂ©pĆk, megtĂ©vesztĆ hĂvĂĄsok, helyszĂni megtĂ©vesztĂ©s. MiĂ©rt fontos? Mert ezek a tĂĄmadĂĄsok közvetlenĂŒl az ĂŒzletmenetet, fizikai infrastruktĂșrĂĄt Ă©s embereket cĂ©lozzĂĄk â Ă©s gyakran megkerĂŒlik a hagyomĂĄnyos hĂĄlĂłzati vĂ©delmet. Mit ad egy cĂ©lzott red team teszt a beyondâtheânetwork terĂŒleten? - ValĂłdi, gyakorlatias sebezhetĆsĂ©gtĂ©rkĂ©p (nem csak elmĂ©leti). - JavulĂł fizikai biztonsĂĄgi protokollok Ă©s belĂ©ptetĂ©si szabĂĄlyok. - ErĆsödĆ dolgozĂłi tudatossĂĄg Ă©s incident response a helyszĂni esemĂ©nyekre. Ărdemes proaktĂvan felmĂ©rni, mert a tĂĄmadĂłk nem vĂĄlogatnak â ha van bejĂĄratod, be fognak menni. đȘđ / Beyond-the-Network â when the attack doesnât start on the network đ§ Real risks often come beyond the network. Beyond-the-network attacks penetrate organizations through physical and human vectors. đą Physical access â bypassing entry systems, tailgating, defeating locks and access controls. đ Device compromise â infected USBs, mice, printers, compromised IoT and OT devices. đĄ Rogue networks & devices â fake Wi-Fi, rogue APs, compromised external devices. đ Supply-chain & third-party vectors â gaining access through vendors or maintenance staff. đ”ïžâïž Offline social engineering â fake credentials, deceptive calls, on-site manipulation. Why it matters: these attacks directly target business operations, physical infrastructure, and people â often bypassing traditional network defenses. What does a focused Red Team test deliver in the beyond-the-network domain? - A realistic, practical vulnerability map â not just theoretical. - Improved physical security protocols and access controls. - Stronger employee awareness and incident response for on-site events. Proactive assessment is crucial â attackers donât discriminate. If thereâs a way in, they will find it. đȘđ #BeyondTheNetwork #RedTeam #PhysicalSecurity #SocialEngineering #OTsecurity
-
đđ Hivatalosan is ĂĄtadtuk a NyĂregyhĂĄzi Egyetem Ășj kiberbiztonsĂĄgi oktatĂłlaborjĂĄt, amely Fortified Cyber Arena platformunkra Ă©pĂŒl: valĂłs, szimulĂĄlt tĂĄmadĂĄsi szcenĂĄriĂłkon keresztĂŒl ad gyakorlati tudĂĄst a hallgatĂłknak. Az ĂĄtadĂĄson cĂ©gĂŒnk ĂŒgyvezetĆje, Erdei Csaba vett rĂ©szt Ă©s adta ĂĄt a labort az egyetemnek. Ez az egyĂŒttmƱködĂ©s Ășj szintre emeli a hazai kiberbiztonsĂĄgi utĂĄnpĂłtlĂĄs-kĂ©pzĂ©st â több felkĂ©szĂŒlt szakember, biztonsĂĄgosabb digitĂĄlis környezet. đȘ đ Cikk: https://lnkd.in/dPdqPU3c #FortifiedCyberArena #ACPMIT #KiberbiztonsĂĄg #CyberSecurity #NyĂregyhĂĄziEgyetem #Education #EdTech Csaba Erdei, Marton Miklos
-