{"id":801,"date":"2019-08-23T15:15:02","date_gmt":"2019-08-23T13:15:02","guid":{"rendered":"https:\/\/www.icsec.pl\/ksc-forum-2019\/"},"modified":"2022-07-08T12:03:51","modified_gmt":"2022-07-08T10:03:51","slug":"ksc-forum-2019","status":"publish","type":"post","link":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/","title":{"rendered":"KSC Forum 2019"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/www.icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-1024x535.png\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-1024x535.png 1024w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-300x157.png 300w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-768x401.png 768w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-67x35.png 67w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-115x60.png 115w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-289x151.png 289w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-439x229.png 439w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-410x214.png 410w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-951x497.png 951w, https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The implementation of the 2018 Act on the <strong>National Cybersecurity System<\/strong> is a great organizational and technological challenge for many entities &#8211; enterprises and institutions that are operators of key services and <strong>are subject to the requirements of the Act<\/strong>. Dialogue and exchange of experiences are extremely necessary to develop an effective cybersecurity system, ICsec has sponsored the <strong>KSC Forum 2019<\/strong>, which will take place on <strong>August 28-30, 2019<\/strong> in Zakopane.<\/p>\n\n\n\n<p><strong>In the KSC Forum program<\/strong>&nbsp;you will find answers, among others for questions:<\/p>\n\n\n\n<ul><li>How to encourage entities that are often competitive on the market to cooperate?<\/li><li>What is a key service?<\/li><li>What are the acceptable system unavailability thresholds for a critical service?<\/li><li>What are the benefits of being on the OUK list?<\/li><li>How to report incidents in the face of a multitude of regulations regarding incidents,<\/li><li>How to collaborate with CSIRT<\/li><\/ul>\n\n\n\n<p>For more information and a detailed agenda, please visit&nbsp;<a href=\"https:\/\/icsec.pl\/ksc-forum-2019\/www.kscforum.pl\">www.kscforum.pl<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The implementation of the 2018 Act on the National Cybersecurity System is a great organizational and technological challenge for many entities &#8211; enterprises and institutions that are operators of key services and are subject to the requirements of the Act. Dialogue and exchange of experiences are extremely necessary to develop an effective cybersecurity system, ICsec [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":639,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>KSC Forum 2019 - ICsec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KSC Forum 2019 - ICsec\" \/>\n<meta property=\"og:description\" content=\"The implementation of the 2018 Act on the National Cybersecurity System is a great organizational and technological challenge for many entities &#8211; enterprises and institutions that are operators of key services and are subject to the requirements of the Act. Dialogue and exchange of experiences are extremely necessary to develop an effective cybersecurity system, ICsec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"ICsec\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-23T13:15:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-08T10:03:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-400x250.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Karolina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ICsec_SA\" \/>\n<meta name=\"twitter:site\" content=\"@ICsec_SA\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karolina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\"},\"author\":{\"name\":\"Karolina\",\"@id\":\"https:\/\/icsec.pl\/#\/schema\/person\/e4532267aeac86bb8e793fd6ee2052c8\"},\"headline\":\"KSC Forum 2019\",\"datePublished\":\"2019-08-23T13:15:02+00:00\",\"dateModified\":\"2022-07-08T10:03:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\"},\"wordCount\":155,\"publisher\":{\"@id\":\"https:\/\/icsec.pl\/#organization\"},\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\",\"url\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\",\"name\":\"KSC Forum 2019 - ICsec\",\"isPartOf\":{\"@id\":\"https:\/\/icsec.pl\/#website\"},\"datePublished\":\"2019-08-23T13:15:02+00:00\",\"dateModified\":\"2022-07-08T10:03:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/icsec.pl\/en\/ksc-forum-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/icsec.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KSC Forum 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/icsec.pl\/#website\",\"url\":\"https:\/\/icsec.pl\/\",\"name\":\"ICsec\",\"description\":\"Tworzymy dla przemys\u0142u produkty, kt\u00f3re zwi\u0119kszaj\u0105 cyberbezpiecze\u0144stwo\",\"publisher\":{\"@id\":\"https:\/\/icsec.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/icsec.pl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/icsec.pl\/#organization\",\"name\":\"ICsec S.A.\",\"url\":\"https:\/\/icsec.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icsec.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/icsec.pl\/content\/uploads\/2021\/10\/icsec-logo-u-1.svg\",\"contentUrl\":\"https:\/\/icsec.pl\/content\/uploads\/2021\/10\/icsec-logo-u-1.svg\",\"width\":226.8,\"height\":226.8,\"caption\":\"ICsec S.A.\"},\"image\":{\"@id\":\"https:\/\/icsec.pl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/ICsec_SA\",\"https:\/\/www.linkedin.com\/company\/icsecsa\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/icsec.pl\/#\/schema\/person\/e4532267aeac86bb8e793fd6ee2052c8\",\"name\":\"Karolina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icsec.pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/558f2a63d5d0427faa7f588628452eda?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/558f2a63d5d0427faa7f588628452eda?s=96&d=mm&r=g\",\"caption\":\"Karolina\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KSC Forum 2019 - ICsec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/","og_locale":"en_US","og_type":"article","og_title":"KSC Forum 2019 - ICsec","og_description":"The implementation of the 2018 Act on the National Cybersecurity System is a great organizational and technological challenge for many entities &#8211; enterprises and institutions that are operators of key services and are subject to the requirements of the Act. Dialogue and exchange of experiences are extremely necessary to develop an effective cybersecurity system, ICsec [&hellip;]","og_url":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/","og_site_name":"ICsec","article_published_time":"2019-08-23T13:15:02+00:00","article_modified_time":"2022-07-08T10:03:51+00:00","og_image":[{"width":400,"height":250,"url":"https:\/\/icsec.pl\/content\/uploads\/2021\/08\/Kopia-Projekt-bez-tytu\u0142u-400x250.png","type":"image\/png"}],"author":"Karolina","twitter_card":"summary_large_image","twitter_creator":"@ICsec_SA","twitter_site":"@ICsec_SA","twitter_misc":{"Written by":"Karolina","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/#article","isPartOf":{"@id":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/"},"author":{"name":"Karolina","@id":"https:\/\/icsec.pl\/#\/schema\/person\/e4532267aeac86bb8e793fd6ee2052c8"},"headline":"KSC Forum 2019","datePublished":"2019-08-23T13:15:02+00:00","dateModified":"2022-07-08T10:03:51+00:00","mainEntityOfPage":{"@id":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/"},"wordCount":155,"publisher":{"@id":"https:\/\/icsec.pl\/#organization"},"articleSection":["Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/","url":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/","name":"KSC Forum 2019 - ICsec","isPartOf":{"@id":"https:\/\/icsec.pl\/#website"},"datePublished":"2019-08-23T13:15:02+00:00","dateModified":"2022-07-08T10:03:51+00:00","breadcrumb":{"@id":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/icsec.pl\/en\/ksc-forum-2019\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/icsec.pl\/en\/ksc-forum-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/icsec.pl\/en\/"},{"@type":"ListItem","position":2,"name":"KSC Forum 2019"}]},{"@type":"WebSite","@id":"https:\/\/icsec.pl\/#website","url":"https:\/\/icsec.pl\/","name":"ICsec","description":"Tworzymy dla przemys\u0142u produkty, kt\u00f3re zwi\u0119kszaj\u0105 cyberbezpiecze\u0144stwo","publisher":{"@id":"https:\/\/icsec.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/icsec.pl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/icsec.pl\/#organization","name":"ICsec S.A.","url":"https:\/\/icsec.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icsec.pl\/#\/schema\/logo\/image\/","url":"https:\/\/icsec.pl\/content\/uploads\/2021\/10\/icsec-logo-u-1.svg","contentUrl":"https:\/\/icsec.pl\/content\/uploads\/2021\/10\/icsec-logo-u-1.svg","width":226.8,"height":226.8,"caption":"ICsec S.A."},"image":{"@id":"https:\/\/icsec.pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/ICsec_SA","https:\/\/www.linkedin.com\/company\/icsecsa\/"]},{"@type":"Person","@id":"https:\/\/icsec.pl\/#\/schema\/person\/e4532267aeac86bb8e793fd6ee2052c8","name":"Karolina","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icsec.pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/558f2a63d5d0427faa7f588628452eda?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/558f2a63d5d0427faa7f588628452eda?s=96&d=mm&r=g","caption":"Karolina"}}]}},"_links":{"self":[{"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/posts\/801"}],"collection":[{"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/comments?post=801"}],"version-history":[{"count":5,"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/posts\/801\/revisions"}],"predecessor-version":[{"id":1393,"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/posts\/801\/revisions\/1393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/media\/639"}],"wp:attachment":[{"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/media?parent=801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icsec.pl\/en\/wp-json\/wp\/v2\/categories?post=801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}