Events 0
En
Ua
Events 0
Search result:
Cybersecurity in Wartime: Challenges and Priorities for the State and Business- image 1

Cybersecurity in Wartime: Challenges and Priorities for the State and Business

A one-day conference “IT Meets Tech: Cybersecurity”, organized by Lviv IT Cluster with the support of the State Service for Special Communications and Information Protection of Ukraine and the USAID Project “Cybersecurity of Ukraine’s Critical Infrastructure”.

CEO of iIT Distribution Yuri Gatupov was a part of this surprisingly important event and spoke at a panel discussion on “Key Lessons for Protecting Companies”.

Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 21Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 22 Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 23Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 24

The main focus of the conference was on the steps to be taken by the state and business to create an effective system of cyber defense and cooperation in security issues.

“The state’s priority is secure cyberspace. The state is interested in ensuring that services are safe. That is why it is important to ensure that everyone complies with a sufficient level of cyber protection. Our business reacts with horror to the word “control”, fearing that there will be interference in business activities. However, it is not about control, but about monitoring the implementation of cybersecurity systems and reporting by sectoral authorities on the implementation of certain norms in practice.”

– emphasized Oleksandr Potiy, Deputy Head of the State Special Communications Service.

Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 25Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 26

“We work with innovations that develop every day. If we do not share the latest developments with each other, we will be left behind. The topic of cyber defense is important nowadays both for Ukraine and globally, given the global trends and the aggressive war waged by Russia. Every day the enemy attacks us in cyberspace. That’s why we have gathered experts who can share useful knowledge and interesting thoughts with IT Meets attendees. And thus, help them protect themselves, their businesses, and government agencies from cyberattacks.”

– added Ivan Babichuk, representative of the Supervisory Board of Lviv IT Cluster.

Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 27Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 28 Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 29Cybersecurity in Wartime: Challenges and Priorities for the State and Business - image 30

There are two ways for Ukrainian business. The first is to work in expectation of an attack and afterwards try to eliminate the consequences and save your systems. The second is to actively monitor potential security flaws, in particular with the help of specialists from government agencies, and implement an effective defense system, reducing the likelihood of a successful attack.

Threats change daily, so you need to constantly improve your security systems. Building a security system once and hoping it will always work is not the best strategy.

Effective cybersecurity consists of many components, among which awareness of employees and officers plays an important role. After all, a significant number of attacks are launched because people do not know and follow the rules of cyber hygiene, not to mention the ability to respond quickly and correctly to an unusual situation.

iIT Distribution specializes in implementing the world’s best cybersecurity solutions. Our company represents high-tech developments of world-renowned manufacturers on the Ukrainian market, including: A10 Networks, CrowdStrike, GTB Technologies, LogRhythm, Labyrinth, Picus Security, Threema, Wallix and many others. We cooperate with vendors that have proven the effectiveness of their solutions and are in demand among government agencies in different countries and the largest global corporations. We offer effective solutions for endpoint and mobile device security, security policy management and data leakage prevention, email security, and DDoS protection. We practice an integrated approach, in which the client receives the necessary software, hardware, as well as implementation and promotion services.

NEWS

Current news on your topic

All news
All news