{"id":731,"date":"2015-04-24T09:11:11","date_gmt":"2015-04-24T09:11:11","guid":{"rendered":"https:\/\/ngsec.eu\/2015\/?page_id=731"},"modified":"2015-04-27T11:53:29","modified_gmt":"2015-04-27T11:53:29","slug":"warsztaty","status":"publish","type":"page","link":"https:\/\/ngsec.eu\/2015\/warsztaty\/","title":{"rendered":"Warsztaty"},"content":{"rendered":"<p><div class=\"et_pb_section et_pb_section_parallax et_section_regular\" style='background-color:#f7f7f7;'>\n\t\t\t<div class=\"et_parallax_bg et_pb_parallax_css\" style=\"background-image: url(https:\/\/ngsec.eu\/2015\/wp-content\/uploads\/2015\/04\/main-menu-agenda.jpg);\"><\/div>\n\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_row\">\n\t\t\t<div class=\"et_pb_column et_pb_column_4_4\">\n\t\t\t<div class=\"et_pb_text et_pb_bg_layout_light et_pb_text_align_left\">\n\t\t\t\n<div style=\"text-transform: uppercase; font-weight: lighter;\">\n<h1>Warsztaty<\/h1>\n<h5 style=\"color: #b4b4b4;\">Tematy warsztat\u00f3w konferencji<\/h5>\n<\/div>\n\n\t\t<\/div> <!-- .et_pb_text -->\n\t\t<\/div> <!-- .et_pb_column -->\n\t\t<\/div> <!-- .et_pb_row -->\n\t\t\t\n\t\t<\/div> <!-- .et_pb_section --><div class=\"et_pb_section et_section_regular\">\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_row\">\n\t\t\t<div class=\"et_pb_column et_pb_column_2_3\">\n\t\t\t<div class=\"et_pb_posts et_pb_bg_layout_light\">\n\t\t\t\n\t\t<article id=\"post-1175\" class=\"et_pb_post et_pb_no_thumb post-1175 post type-post status-publish format-standard hentry category-warsztaty\">\n\n\t\t\n\t\t\t\t\t\t\t\t\t<h2><a href=\"https:\/\/ngsec.eu\/2015\/warsztat-informatyka-sledcza\/\">Informatyka \u015bledcza i e-discovery \u2013 bezpiecze\u0144stwo organizacji XXI wieku<\/a><\/h2>\n\t\t\t\n\t\t\t<p>Dzisiejsze prowadzenie biznesu to ca\u0142y system organizacyjno &#8211; funkcjonalny pozwalaj\u0105cy na realizacj\u0119 g\u0142\u00f3wnej polityki firmy.  Wyszukiwanie informacji w dziesi\u0105tkach tysi\u0119cy miejsc \u2013 stacji komputerowych, mo\u017ce by\u0107 k\u0142opotliwe, jak udowodni\u0107 gdzie, kto dokona\u0142 nadu\u017cycia, zmowa cenowa \u2013 ok, mo\u017cemy zebra\u0107  niezb\u0119dne dowody i dokona\u0107 zestawienia dzia\u0142a\u0144 sprawcy. <\/p>\n\t\t\n\t\t<\/article> <!-- .et_pb_post -->\n\n\t\t<article id=\"post-880\" class=\"et_pb_post et_pb_no_thumb post-880 post type-post status-publish format-standard hentry category-warsztaty\">\n\n\t\t\n\t\t\t\t\t\t\t\t\t<h2><a href=\"https:\/\/ngsec.eu\/2015\/warsztat-novell\/\">Mobilny dost\u0119p do plik\u00f3w<\/a><\/h2>\n\t\t\t\n\t\t\t<p>Mobilny dost\u0119p do plik\u00f3w z dowolnych urz\u0105dze\u0144 bez wynoszenia ich poza firm\u0119, nara\u017cania na utrat\u0119 kontroli nad plikami, konieczno\u015bci definiowania od nowa plityk dost\u0119pu czy duplikowania mechanizm\u00f3w backupu. Uczestnicy warsztatu zapoznaj\u0105 si\u0119 z systemem Filr firmy Micro Focus &#8211; Novell.<\/p>\n\t\t\n\t\t<\/article> <!-- .et_pb_post -->\n\n\t\t<article id=\"post-729\" class=\"et_pb_post et_pb_no_thumb post-729 post type-post status-publish format-standard hentry category-warsztaty\">\n\n\t\t\n\t\t\t\t\t\t\t\t\t<h2><a href=\"https:\/\/ngsec.eu\/2015\/warsztat-fortinet\/\">Zabezpieczenia Fortinet APT do ochrony sieci przed zaawansowanymi atakami<\/a><\/h2>\n\t\t\t\n\t\t\t<p>Warsztaty przygotowane s\u0105 z my\u015bl\u0105 o osobach zajmuj\u0105cych si\u0119 implementacj\u0105 i doborem rozwi\u0105za\u0144 bezpiecze\u0144stwa, kt\u00f3re chc\u0105 pog\u0142\u0119bi\u0107 wiedz\u0119 na temat zaawansowanych atak\u00f3w (ATP\/ATA) oraz sposob\u00f3w zapobiegania ich wyst\u0119powaniu.<\/p>\n\t\t\n\t\t<\/article> <!-- .et_pb_post -->\n\n\t\t<\/div> <!-- .et_pb_posts -->\n\t\t<\/div> <!-- .et_pb_column --><div class=\"et_pb_column et_pb_column_1_3\">\n\t\t\t<div class=\"et_pb_widget_area et_pb_widget_area_right clearfix et_pb_bg_layout_light\">\n\t\t\t<div id=\"archives-2\" class=\"et_pb_widget widget_archive\"><h4 class=\"widgettitle\">Archiwa<\/h4>\n\t\t\t<ul>\n\t\t\t\t\t<li><a href='https:\/\/ngsec.eu\/2015\/2015\/06\/'>czerwiec 2015<\/a><\/li>\n\t<li><a href='https:\/\/ngsec.eu\/2015\/2015\/05\/'>maj 2015<\/a><\/li>\n\t<li><a href='https:\/\/ngsec.eu\/2015\/2015\/04\/'>kwiecie\u0144 2015<\/a><\/li>\n\t<li><a href='https:\/\/ngsec.eu\/2015\/2015\/03\/'>marzec 2015<\/a><\/li>\n\t<li><a href='https:\/\/ngsec.eu\/2015\/2015\/02\/'>luty 2015<\/a><\/li>\n\t<li><a href='https:\/\/ngsec.eu\/2015\/2015\/01\/'>stycze\u0144 2015<\/a><\/li>\n\t\t\t<\/ul>\n\n\t\t\t<\/div> <!-- end .et_pb_widget --><div id=\"search-2\" class=\"et_pb_widget widget_search\"><form role=\"search\" method=\"get\" id=\"searchform\" class=\"searchform\" action=\"https:\/\/ngsec.eu\/2015\/\">\n\t\t\t\t<div>\n\t\t\t\t\t<label class=\"screen-reader-text\" for=\"s\">Szukaj:<\/label>\n\t\t\t\t\t<input type=\"text\" value=\"\" name=\"s\" id=\"s\" \/>\n\t\t\t\t\t<input type=\"submit\" id=\"searchsubmit\" value=\"Szukaj\" \/>\n\t\t\t\t<\/div>\n\t\t\t<\/form><\/div> <!-- end .et_pb_widget --><div id=\"text-2\" class=\"et_pb_widget widget_text\"><h4 class=\"widgettitle\">Sprawd\u017a nas r\u00f3wnie\u017c tutaj:<\/h4>\t\t\t<div class=\"textwidget\"><div class=\"et_pb_promo et_pb_bg_layout_dark et_pb_text_align_center et_pb_no_bg\" style=\"text-align:left; padding-top:20px !important\">\r\n<a class=\"et_pb_promo_button\" href=\"https:\/\/www.facebook.com\/ngsec\">Facebook<\/a>\r\n<\/div><\/div>\n\t\t<\/div> <!-- end .et_pb_widget --><div id=\"text-4\" class=\"et_pb_widget widget_text\"><h4 class=\"widgettitle\">Do\u0142\u0105cz te\u017c do grupy na LinkedIn<\/h4>\t\t\t<div class=\"textwidget\"><div class=\"et_pb_promo et_pb_bg_layout_dark et_pb_text_align_center et_pb_no_bg\" style=\"text-align:left; padding-top:20px !important\">\r\n<a class=\"et_pb_promo_button\" href=\"http:\/\/www.linkedin.com\/grp\/home?gid=8317790\">LinkedIn<\/a>\r\n<\/div><\/div>\n\t\t<\/div> <!-- end .et_pb_widget -->\n\t\t<\/div> <!-- .et_pb_widget_area -->\n\t\t<\/div> <!-- .et_pb_column -->\n\t\t<\/div> <!-- .et_pb_row -->\n\t\t\t\n\t\t<\/div> <!-- .et_pb_section --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/pages\/731"}],"collection":[{"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/comments?post=731"}],"version-history":[{"count":6,"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/pages\/731\/revisions"}],"predecessor-version":[{"id":879,"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/pages\/731\/revisions\/879"}],"wp:attachment":[{"href":"https:\/\/ngsec.eu\/2015\/wp-json\/wp\/v2\/media?parent=731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}