Július Selecký
Július Selecký has been working in the field of information and cyber security for more than 10 years. He studied at the Department of Information Systems, Faculty of Management, Comenius University in Bratislava. He later completed his doctoral studies at this faculty. He has long worked as a teacher at the Faculty of Management, Charles University, where he leads lectures and exercises in subjects in the field of information systems, management and security. He joined ESET in 2018 as a Senior Technical Pre-Sales Representative. His main responsibilities are consulting advice primarily for the enterprise customer segment, responsibility for testing and providing presentations of ESET products.
Sign in to ITAPA Health&Care 2025
-
DISCUSSION "Cybersec and incidents"
-
Don't give threats a chance with sophisticated EDR tools
We build walls to keep the attackers away. Ordinary users can have infected workstations for several months without knowing it. Time play is a key role in these cases. Detection and Response (EDR) tools are designed to complement existing endpoint security. It is a strategy that allows your company to constantly monitor potential cyber threats and respond proactively to them. Be one step ahead with sophisticated EDR tools - don't give threats a chance. During the presentation, we identify the key benefits of EDR systems such as incident capture, network isolation of devices or detection of behavioral anomalies.
-
How to effectively "hunt" threats and investigate incidents
At the beginning we were given a short assignment. Our customer needed to improve the visibility of his workstations so that he was able to monitor and block threats in real time in his heterogeneous environment. The implementation of ESET Enterprise Inspector EDR has just started. In today's coronavirus age, there is enormous pressure on IT departments, not only because of the transition to home office, but also because of the increased rate of spreading threats. In the presentation, we will show you some specific examples of how we captured, investigated and blocked advanced threats. -
Discussion
Dicussion of invited guests:
Ján Andraško, Binary Confidence
Roman Čupka, Flowmon Networks
Marek Kľoc, LYNX
Peter Kočík, FORTINET
Július Selecký, ESET
Marek Zeman, Tatra Banka