ACPM IT Consulting Ltd.  Borítókép

RĂłlunk

ACPM provides IT consulting services to major corporations, financial entities and government organizations. Our focus IT SECURITY and BUSINESS INTELLIGENCE consultancy. We also have more than 20 years of experience in IT PROJECT MANAGEMENT and IT AUDIT.

Weboldal
http://www.acpmit.com
Ágazat
IT Services and IT Consulting
Vållalat mérete
11–50 munkavállaló
Központ
Budapest
TĂ­pus
Public Company
AlapĂ­tva
2015
SzakterĂŒletek

Helyek

  • ElsƑdleges

    Széchenyi Istvån tér 7

    Budapest, 1051, HU

    Get directions

Alkalmazottak a ACPM IT Consulting Ltd.

Frissítések

  • 🔒Patch Management & KonfigurĂĄciĂłs MegfelelƑsĂ©g: Kritikus a BiztonsĂĄgos IT-hez /ENG below A rendszeres patching Ă©s a konfigurĂĄciĂłs megfelelƑsĂ©g alapvetƑ az IT biztonsĂĄg Ă©s stabilitĂĄs szempontjĂĄbĂłl. MiĂ©rt fontos? - Csökkenti a sebezhetƑsĂ©geket. - SegĂ­t megfelelni az iparĂĄgi szabvĂĄnyoknak (ISO 27001, NIST, GDPR). - Növeli a rendszerek stabilitĂĄsĂĄt, kevesebb hibĂĄt Ă©s leĂĄllĂĄst okoz. Legjobb gyakorlatok: 1ïžâƒŁ AutomatizĂĄlt patch menedzsment. 2ïžâƒŁ Rendszeres auditok a konfigurĂĄciĂłk ellenƑrzĂ©sĂ©re. 3ïžâƒŁ Kritikus rendszerek prioritĂĄsa. 4ïžâƒŁ DokumentĂĄlt Ă©s ismĂ©telhetƑ folyamatok a compliance-hez. A patch management Ă©s a konfigurĂĄciĂłs megfelelƑsĂ©g egyĂŒtt a biztonsĂĄgos IT mƱködĂ©s alapja. / 🔒 Patch Management & Configuration Compliance: Critical for Secure IT Regular patching and configuration compliance are essential for IT security and stability. Why it matters: - Reduces vulnerabilities. - Helps meet industry standards (ISO 27001, NIST, GDPR). - Increases system stability, minimizing errors and downtime. Best practices: 1ïžâƒŁ Automated patch management. 2ïžâƒŁ Regular audits to check configurations. 3ïžâƒŁ Prioritizing critical systems. 4ïžâƒŁ Documented and repeatable processes for compliance. Together, patch management and configuration compliance form the foundation of secure IT operations. #CyberSecurity #ITCompliance #PatchManagement #ConfigurationManagement #ITSecurity #RiskManagement

  • đŸŽ€ Erdei Csaba, az ACPM IT Zrt. ĂŒgyvezetƑje moderĂĄlta az idei INFOTÉR konferencia egyik kiemelt kerekasztalĂĄt: „KibervĂ©delem Ă©s digitĂĄlis pĂ©nzpiacok. Az alternatĂ­v szolgĂĄltatĂłk vajon lehetƑsĂ©get vagy veszĂ©lyt jelentenek?” KöszönjĂŒk a gondolatĂ©bresztƑ felvezetƑ elƑadĂĄsokat dr. Greinstetter BalĂĄzs (DigitalizĂĄciĂłs igazgatĂłsĂĄg, MNB) Ă©s DudĂĄs MĂĄtĂ© (Check Point Software Technologies) elƑadĂłktĂłl, valamint a panel szakĂ©rtƑinek: OlĂĄh IstvĂĄn (HTE-EIVOK), HalĂĄsz Viktor (KĂ©szenlĂ©ti RendƑrsĂ©g Nemzeti NyomozĂł Iroda KiberbƱnözĂ©s FƑosztĂĄly), LencsĂ©s GĂĄbor (NMHH), Farkas PĂ©ter (biztributor). 👉 Program Ă©s rĂ©szletek: https://lnkd.in/eVcb9UBH #INFOTÉR #kibervĂ©delem #digitĂĄlispĂ©nzpiacok #fintech #cybersecurity #ACPMIT Csaba Erdei, INFOTÉR

    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez
  • 🌿 Nagy örömmel vettĂŒnk rĂ©szt az idei WITSEC konferenciĂĄn az ACPM IT Zrt. csapatĂĄval! InspirĂĄlĂł napot tölthettĂŒnk el a kiberbiztonsĂĄg irĂĄnt elkötelezett szakemberek között, Ă©rtĂ©kes beszĂ©lgetĂ©sekkel Ă©s Ășj kapcsolatokkal gazdagodva. StandunknĂĄl a lĂĄtogatĂłk egy kis jĂĄtĂ©kban – a Fortified Cyber Arena kihĂ­vĂĄsban – prĂłbĂĄlhattĂĄk ki magukat, ahol a sikeres megoldĂĄsĂ©rt cserepes fƱszernövĂ©nyeket vihettek haza đŸŒ±. Nagy öröm volt lĂĄtni, mennyi lelkes rĂ©sztvevƑ kapcsolĂłdott be, Ă©s milyen jĂł hangulat alakult ki! đŸŽ€ KĂŒlön bĂŒszkĂ©k vagyunk Kristina Variash kollĂ©ganƑnkre, aki „When AI Becomes the Attacker: Defending Against Intelligent Cyber Threats” cĂ­mƱ elƑadĂĄsĂĄban az AI-alapĂș kibertĂĄmadĂĄsok Ășj korszakĂĄrĂłl beszĂ©lt. ElƑadĂĄsĂĄban bemutatta, hogyan vĂĄlik a mestersĂ©ges intelligencia nemcsak a vĂ©dekezĂ©s, hanem a tĂĄmadĂĄs eszközĂ©vĂ© is – Ă©s mikĂ©nt kell a kiberbiztonsĂĄgi szakembereknek proaktĂ­van reagĂĄlni az intelligens, adaptĂ­v fenyegetĂ©sekre. Kristina valĂłs pĂ©ldĂĄkon keresztĂŒl mutatta be a megelƑzĂ©s, detektĂĄlĂĄs Ă©s reziliencia fejlesztĂ©sĂ©nek Ășj megközelĂ­tĂ©seit, segĂ­tve a szakmĂĄt felkĂ©szĂŒlni a következƑ generĂĄciĂłs kihĂ­vĂĄsokra. đŸ‘©đŸ’»âœš #TeamACPM WITSEC #WITSEC #SzakmaiNap #Cybersecurity Marton Miklos, Andrea Balogh, Döniz Simon, Judit Kaczur, Luca Hanna BorbĂ©ly, Patrik Neubauer dr. LL.M., Zsuzsanna Szalai , Csaba Sandor Varga

    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez
    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez
    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez
    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez
  • đŸŽ§đŸ–±ïž Mic-E-Mouse /ENG Below A nagy teljesĂ­tmĂ©nyƱ optikai szenzorral felszerelt egerek kĂ©pesek akusztikus rezgĂ©sek Ă©rzĂ©kelĂ©sĂ©re – Ă©s ezzel akĂĄr beszĂ©dinformĂĄciĂłk rekonstruĂĄlĂĄsĂĄra is. 🔍 A kutatĂłk egy olyan tĂĄmadĂĄsi lĂĄncot mutattak be, amely: - a felhasznĂĄlĂł munkafelĂŒletĂ©n terjedƑ rezgĂ©sekbƑl nyer ki adatokat, - gĂ©pi tanulĂĄssal javĂ­tja a torz, kvantĂĄlt jeleket, - Ă©s akĂĄr 80%-os pontossĂĄggal kĂ©pes beszĂ©lƑt azonosĂ­tani. 🎼 A tĂĄmadĂĄs kĂŒlönösen kreatĂ­v szoftverekben Ă©s videojĂĄtĂ©kokban rejtƑzhet el, ahol a magas frekvenciĂĄjĂș egĂ©radatok gyƱjtĂ©se nem gyanĂșs. 💡 MiĂ©rt fontos ez AI governance szempontbĂłl? - A perifĂ©riĂĄk biztonsĂĄga gyakran kimarad a szabĂĄlyozĂĄsi keretekbƑl. - A Mic-E-Mouse esettanulmĂĄny jĂłl pĂ©ldĂĄzza, hogyan vĂĄlhat egy ĂĄrtalmatlannak tƱnƑ eszköz az adatgyƱjtĂ©s eszközĂ©vĂ©. - SĂŒrgeti a hardveres Ă©s szoftveres auditok kiterjesztĂ©sĂ©t – nemcsak a központi rendszerekre, hanem a teljes ökoszisztĂ©mĂĄra. 💬 Te mit gondolsz? Helyet kell kapnia a perifĂ©riĂĄk biztonsĂĄgĂĄnak az AI szabĂĄlyozĂĄsi keretrendszerekben? / đŸŽ§đŸ–±ïžMic-E-Mouse The Mic-E-Mouse research highlights a surprisingly underrated risk: high-performance optical sensors in computer mice can detect acoustic vibrations – and potentially reconstruct elements of human speech. 🔍 The researchers demonstrated an attack chain that: - extracts data from vibrations transmitted through the user’s desk surface, - uses machine learning to enhance distorted, quantized signals, - and can identify speakers with up to 80% accuracy. 🎼 The attack can be cleverly hidden in creative software or video games, where collecting high-frequency mouse data is not considered suspicious. 💡 Why does this matter for AI governance? - Peripheral security is often overlooked in regulatory frameworks. - The Mic-E-Mouse case study illustrates how seemingly harmless devices can become tools for data extraction. - It calls for expanding hardware and software audits — not only for core systems, but across the entire ecosystem. 💬 What do you think? Should peripheral security be part of AI regulatory frameworks? #Cybersecurity #AIgovernance #MicEMouse #PrivacyByDesign #PeripheralSecurity #DataProtection #Research

  • 📘 Mi szĂĄmĂ­t mestersĂ©ges intelligencia rendszernek az EU AI Act szerint?/ENG below Sokszor halljuk a kĂ©rdĂ©st: mi szĂĄmĂ­t valĂłjĂĄban mestersĂ©ges intelligenciĂĄnak az EU Ășj AI Act szerint? A vĂĄlasz nem is olyan egyszerƱ, hiszen nem minden „okos” szoftver MI-rendszer. Az MI-rendszer (AI system) egy olyan gĂ©palapĂș rendszer, amely âžĄïž bemeneteket fogad (adatokat, utasĂ­tĂĄsokat), âžĄïž inferencia – azaz következtetĂ©s – rĂ©vĂ©n feldolgozza ezeket, âžĄïž majd kimeneteket ad (pl. elƑrejelzĂ©s, tartalom, ajĂĄnlĂĄs, döntĂ©s), amelyek befolyĂĄsolhatjĂĄk a fizikai vagy digitĂĄlis környezetet. Az MI-rendszerek kĂŒlönbözƑ technikĂĄkon alapulhatnak, pĂ©ldĂĄul: 🧠 gĂ©pi tanulĂĄs (machine learning – pl. kĂ©pfelismerĂ©s, szövegelemzĂ©s), ⚙ logikai Ă©s tudĂĄsalapĂș megközelĂ­tĂ©sek (pl. szabĂĄlyalapĂș döntĂ©stĂĄmogatĂĄs). Fontos: nem minden szoftver szĂĄmĂ­t MI-nek. Az AI Act szerint csak az tekinthetƑ mestersĂ©ges intelligenciĂĄnak, amely önĂĄllĂł következtetĂ©sre kĂ©pes, nem pedig pusztĂĄn elƑre beprogramozott utasĂ­tĂĄsokat hajt vĂ©gre. Az MI fogalma tehĂĄt szĂ©les, de nem korlĂĄtlan: a jogalkotĂł cĂ©lja, hogy lefedje a modern, adaptĂ­v technolĂłgiĂĄkat, miközben vilĂĄgos kĂŒlönbsĂ©get tesz a hagyomĂĄnyos szoftverekkel szemben. / What counts as an Artificial Intelligence system under the EU AI Act? We often hear the question: what actually qualifies as artificial intelligence under the EU’s new AI Act? The answer isn’t that simple — not every “smart” software is an AI system. An AI system is a machine-based system that âžĄïž receives inputs (data, instructions), âžĄïž processes them through inference, and âžĄïž produces outputs (e.g. prediction, content, recommendation, decision) that can influence the physical or digital environment. AI systems can be based on various techniques, such as: 🧠 machine learning (e.g. image recognition, text analysis), ⚙ logic- and knowledge-based approaches (e.g. rule-based decision support). Important: not every software is considered AI. According to the AI Act, only systems capable of autonomous inference qualify as artificial intelligence — not those that merely execute pre-programmed instructions. The concept of AI is therefore broad, but not unlimited: the legislator’s goal was to cover modern, adaptive technologies while clearly distinguishing them from traditional software. #AIAct #MestersĂ©gesIntelligencia #AI #EUrendelet #ACPM #AIszabĂĄlyozĂĄs

  • đŸȘ„Ă–römmel jelentjĂŒk, hogy Kristina Variash, az ACPM IT Zrt. Cybersecurity Project Menedzsere elƑadĂĄst tart a WITSEC Szakmai Nap 2025 rendezvĂ©nyen, oktĂłber 28-ĂĄn! 👉 https://lnkd.in/dE2M8cQK 🔐 ElƑadĂĄs cĂ­me: When AI Becomes the Attacker – Defending Against Intelligent Cyber Threats Az elƑadĂĄs közĂ©ppontjĂĄban az a jelensĂ©g ĂĄll, hogy a mestersĂ©ges intelligencia nemcsak a kiberbiztonsĂĄg hatĂ©kony vĂ©delmi eszközekĂ©nt jelenik meg, hanem Ășj tĂ­pusĂș fenyegetĂ©skĂ©nt is. Kristina bemutatja, hogyan mƱködnek az AI ĂĄltal vezĂ©relt tĂĄmadĂĄsok, miĂ©rt vallanak kudarcot a hagyomĂĄnyos vĂ©delmi mechanizmusok, Ă©s milyen innovatĂ­v stratĂ©giĂĄkkal kĂ©szĂŒlhetnek fel a szervezetek az intelligens kiberfenyegetĂ©sekkel szemben. 📍 HelyszĂ­n: Magyar Telekom SzĂ©khĂĄz, Budapest 📅 DĂĄtum: 2025. oktĂłber 28. đŸŽŸïž RĂ©szvĂ©tel ingyenes, de regisztrĂĄciĂłhoz kötött 🇬🇧We’re proud to share that Kristina Variash, Cybersecurity Project Manager at ACPM IT Zrt., will be speaking at the WITSEC Professional Day 2025 on October 28th! 👉 https://lnkd.in/dE2M8cQK 🔐 Talk title: When AI Becomes the Attacker – Defending Against Intelligent Cyber Threats Artificial intelligence is reshaping the cybersecurity landscape — not only as a powerful defense tool but also as a new and evolving threat. In her talk, Kristina will explore how AI-driven attacks operate, why traditional defenses fail, and what innovative strategies can help organizations build resilience against intelligent cyber threats. 📍 Location: Magyar Telekom Headquarters, Budapest 📅 Date: October 28, 2025 đŸŽŸïž Free entry, registration required #CyberSecurity WITSEC #AI #ArtificialIntelligence #KiberbiztonsĂĄg #ACPMIT Kristina Variash , Marton Miklos

    A(z) WITSEC szervezeti oldalånak megtekintése

    950 követƑ

    𝗔 đ—Ș𝗜𝗧𝗩𝗘𝗖 𝘀𝘇𝗼𝗾đ—șđ—źđ—¶ đ—»đ—źđ—œđ—Œđ—»: đŸŽ€Variash Kristina: When AI Becomes the Attacker: Defending Against Intelligent Cyber Threats As artificial intelligence becomes increasingly integrated into cybersecurity systems, it is also emerging as a powerful tool for attackers. AI-driven threats can adapt, learn, and exploit vulnerabilities faster than traditional methods, posing unprecedented challenges to defense mechanisms. This presentation explores the evolving landscape of intelligent cyber threats, showcasing real-world examples of AI-enabled attacks and discussing proactive strategies for detection, prevention, and resilience. By understanding how AI can both protect and endanger digital infrastructures, we can better prepare for the next generation of cybersecurity challenges. 👉Kristina Variash is a Cybersecurity Project Manager at ACPM IT Consulting Ltd., where she successfully leads complex international cybersecurity projects, including initiatives across the MENA region. Her ability to navigate the technical and logistical challenges of this global field is grounded in her robust academic background, which includes a Bachelor's degree in Electrical Engineering and her current pursuit of a Master's in Computer Science at Óbuda University. This potent combination of technical knowledge and project management discipline is further complemented by her experience in university administration at Óbuda, where she serves as an Assistant to the Vice Rector, blending strategic oversight with an understanding of international academic collaboration. In addition to her administrative and research responsibilities, she also teaches Entrepreneurship at the university, fostering innovation and practical business thinking among students. 💡Az elƑadĂĄs nyelve angol. 📍A szakmai nap programja Ă©s rĂ©szletei: https://lnkd.in/dE2M8cQK

    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez
  • ProaktĂ­v Cybersecurity Audit & Compliance 🚀 /ENG below A kiberfenyegetĂ©sek folyamatosan vĂĄltoznak, Ă©s a hagyomĂĄnyos, Ă©ves auditok mĂĄr nem mindig elegendƑek. A proaktĂ­v audit Ă©s compliance lehetƑvĂ© teszi, hogy a szervezet ne csak reagĂĄljon, hanem megelƑzze a problĂ©mĂĄkat, mielƑtt azok ĂŒzleti kĂĄrokat okoznĂĄnak. MiĂ©rt Ă©rdemes proaktĂ­van hozzĂĄĂĄllni? 🔍Korai kockĂĄzatfelismerĂ©s – azonosĂ­tsd a gyenge pontokat a rendszereidben, folyamatokban Ă©s emberi tĂ©nyezƑkben, mielƑtt tĂĄmadĂłk kihasznĂĄlnĂĄk Ƒket. 📈Folyamatos folyamatfejlesztĂ©s – a compliance Ă©s audit nem egyszeri esemĂ©ny, hanem eszköz a vĂ©delmi intĂ©zkedĂ©sek folyamatos javĂ­tĂĄsĂĄhoz. đŸ€Növelt partner- Ă©s ĂŒgyfĂ©lbizalom – bizonyĂ­tsd, hogy a szervezeted biztonsĂĄgos Ă©s elƑrelĂĄtĂł, Ă­gy erƑsĂ­tve ĂŒzleti kapcsolataidat. 💰KöltsĂ©ghatĂ©konysĂĄg – a problĂ©mĂĄk korai felismerĂ©se Ă©s kezelĂ©se sokkal olcsĂłbb, mint a incidensek utĂłlagos orvoslĂĄsa. 💡 Tipp: tekintsd a cybersecurity compliance-t Ă©s auditot folyamatos ĂŒzleti eszköznek, nem pusztĂĄn Ă©ves kötelezettsĂ©gnek. Ez a stratĂ©giai hozzĂĄĂĄllĂĄs segĂ­t megelƑzni a kiberincidenseket Ă©s erƑsĂ­teni a szervezet biztonsĂĄgi kultĂșrĂĄjĂĄt. / Proactive Cybersecurity Audit & Compliance 🚀 Cyber threats are constantly evolving, and traditional annual audits are no longer always enough. Proactive audit and compliance allow organizations not just to react, but to prevent issues before they cause business impact. Why take a proactive approach? 🔍 Early risk detection – identify weak points in your systems, processes, and human factors before attackers exploit them. 📈 Continuous process improvement – compliance and audits are not one-time events, but tools to continuously strengthen security measures. đŸ€ Increased partner and client trust – demonstrate that your organization is secure and forward-thinking, enhancing business relationships. 💰 Cost efficiency – detecting and addressing issues early is much cheaper than dealing with incidents afterward. 💡 Tip: Treat cybersecurity compliance and audits as ongoing business enablers, not just annual obligations. This strategic approach helps prevent cyber incidents and strengthens your organization’s security culture. #CyberSecurity #ProactiveAudit #Compliance #RiskManagement #InfoSec #ContinuousImprovement

  • Beyond‑the‑network — amikor a tĂĄmadĂĄs nem a hĂĄlĂłzaton kezdƑdik 🧭/ENG below A valĂłs kockĂĄzatok gyakran a hĂĄlĂłzaton tĂșlrĂłl jönnek. A beyond‑the‑network tĂĄmadĂĄsok fizikai Ă©s emberi vektorokon keresztĂŒl hatolnak be. 🏱Fizikai hozzĂĄfĂ©rĂ©s — belĂ©pƑk kijĂĄtszĂĄsa, tailgating, belĂ©ptetƑrendszerek Ă©s zĂĄrak kijĂĄtszĂĄsa. 🔌EszközkompromittĂĄlĂĄs — USB/egĂ©r/nyomtatĂł fertƑzĂ©sek, kompromittĂĄlt IoT Ă©s OT eszközök. 📡Rogue hĂĄlĂłzatok & eszközök — hamis Wi‑Fi, rogue AP-k, kompromittĂĄlt kĂŒlsƑ eszközök. 🔗Supply‑chain Ă©s third‑party vektorok — beszĂĄllĂ­tĂłk vagy karbantartĂłk ĂștjĂĄn bejutĂĄs. đŸ•”ïžâ™‚ïžSocial engineering offline — hamis belĂ©pƑk, megtĂ©vesztƑ hĂ­vĂĄsok, helyszĂ­ni megtĂ©vesztĂ©s. MiĂ©rt fontos? Mert ezek a tĂĄmadĂĄsok közvetlenĂŒl az ĂŒzletmenetet, fizikai infrastruktĂșrĂĄt Ă©s embereket cĂ©lozzĂĄk — Ă©s gyakran megkerĂŒlik a hagyomĂĄnyos hĂĄlĂłzati vĂ©delmet. Mit ad egy cĂ©lzott red team teszt a beyond‑the‑network terĂŒleten? - ValĂłdi, gyakorlatias sebezhetƑsĂ©gtĂ©rkĂ©p (nem csak elmĂ©leti). - JavulĂł fizikai biztonsĂĄgi protokollok Ă©s belĂ©ptetĂ©si szabĂĄlyok. - ErƑsödƑ dolgozĂłi tudatossĂĄg Ă©s incident response a helyszĂ­ni esemĂ©nyekre. Érdemes proaktĂ­van felmĂ©rni, mert a tĂĄmadĂłk nem vĂĄlogatnak — ha van bejĂĄratod, be fognak menni. đŸšȘ🔐 / Beyond-the-Network — when the attack doesn’t start on the network 🧭 Real risks often come beyond the network. Beyond-the-network attacks penetrate organizations through physical and human vectors. 🏱 Physical access — bypassing entry systems, tailgating, defeating locks and access controls. 🔌 Device compromise — infected USBs, mice, printers, compromised IoT and OT devices. 📡 Rogue networks & devices — fake Wi-Fi, rogue APs, compromised external devices. 🔗 Supply-chain & third-party vectors — gaining access through vendors or maintenance staff. đŸ•”ïžâ™‚ïž Offline social engineering — fake credentials, deceptive calls, on-site manipulation. Why it matters: these attacks directly target business operations, physical infrastructure, and people — often bypassing traditional network defenses. What does a focused Red Team test deliver in the beyond-the-network domain? - A realistic, practical vulnerability map — not just theoretical. - Improved physical security protocols and access controls. - Stronger employee awareness and incident response for on-site events. Proactive assessment is crucial — attackers don’t discriminate. If there’s a way in, they will find it. đŸšȘ🔐 #BeyondTheNetwork #RedTeam #PhysicalSecurity #SocialEngineering #OTsecurity

  • 🎓🔐 Hivatalosan is ĂĄtadtuk a NyĂ­regyhĂĄzi Egyetem Ășj kiberbiztonsĂĄgi oktatĂłlaborjĂĄt, amely Fortified Cyber Arena platformunkra Ă©pĂŒl: valĂłs, szimulĂĄlt tĂĄmadĂĄsi szcenĂĄriĂłkon keresztĂŒl ad gyakorlati tudĂĄst a hallgatĂłknak. Az ĂĄtadĂĄson cĂ©gĂŒnk ĂŒgyvezetƑje, Erdei Csaba vett rĂ©szt Ă©s adta ĂĄt a labort az egyetemnek. Ez az egyĂŒttmƱködĂ©s Ășj szintre emeli a hazai kiberbiztonsĂĄgi utĂĄnpĂłtlĂĄs-kĂ©pzĂ©st — több felkĂ©szĂŒlt szakember, biztonsĂĄgosabb digitĂĄlis környezet. đŸ’Ș 🔗 Cikk: https://lnkd.in/dPdqPU3c #FortifiedCyberArena #ACPMIT #KiberbiztonsĂĄg #CyberSecurity #NyĂ­regyhĂĄziEgyetem #Education #EdTech Csaba Erdei, Marton Miklos

    • Nincs alternatĂ­v szöveges leĂ­rĂĄs ehhez a kĂ©phez

HasonlĂł oldalak