{"id":395,"date":"2026-04-15T18:26:55","date_gmt":"2026-04-15T16:26:55","guid":{"rendered":"https:\/\/www.bumerank.pl\/?page_id=395"},"modified":"2026-04-15T18:53:35","modified_gmt":"2026-04-15T16:53:35","slug":"safetica-system-dlp-3","status":"publish","type":"page","link":"https:\/\/www.bumerank.pl\/?page_id=395","title":{"rendered":"Webinarium"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"395\" class=\"elementor elementor-395\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3789b3 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"e3789b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7998fc2 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"7998fc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18f130e elementor-widget elementor-widget-image\" data-id=\"18f130e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.bumerank.pl\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"185\" src=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/01\/cropped-KURS-22.png\" class=\"attachment-large size-large wp-image-254\" alt=\"\" srcset=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/01\/cropped-KURS-22.png 688w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/01\/cropped-KURS-22-300x81.png 300w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-898b9a2 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"898b9a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4736593 elementor-widget elementor-widget-heading\" data-id=\"4736593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CYBERBEZPIECZE\u0143STWO\nTechnologia to nasza druga natura<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5aeb74 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"c5aeb74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5895c76 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"5895c76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84ad877 elementor-widget elementor-widget-heading\" data-id=\"84ad877\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wykrywanie zagro\u017ce\u0144, kontrola dost\u0119pu i ochrona danych - <br \/>3 filary cyberbezpiecze\u0144stwa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdb298b elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"bdb298b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">----13 Maj godz 13.00 ----Zapisz si\u0119 ----<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91611af elementor-widget elementor-widget-n-accordion\" data-id=\"91611af\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1520\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Webinarium  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1520\" class=\"elementor-element elementor-element-d35bcbb e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"d35bcbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9ce872 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"a9ce872\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7efebe8 elementor-widget elementor-widget-text-editor\" data-id=\"7efebe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Szukasz sposobu na lepsz\u0105 ochron\u0119 firmowego \u015brodowiska IT, ale nie wiesz, od czego zacz\u0105\u0107? Podczas webinaru poka\u017cemy trzy uzupe\u0142niaj\u0105ce si\u0119 obszary cyberbezpiecze\u0144stwa: wykrywanie i analiz\u0119 zagro\u017ce\u0144 na stacjach roboczych, ochron\u0119 danych przed wyciekiem oraz kontrol\u0119 nad kontami uprzywilejowanymi<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a69248 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"5a69248\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ec188e6 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"ec188e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b508503 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b508503\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/SCI-3.jpg\" class=\"attachment-full size-full wp-image-398\" alt=\"\" srcset=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/SCI-3.jpg 500w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/SCI-3-300x300.jpg 300w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/SCI-3-150x150.jpg 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sebastian Cielecki \u2013 <br \/>product manager ESET, <br \/>DAGMA Bezpiecze\u0144stwo IT<\/h3><p class=\"elementor-image-box-description\">Specjalizuje si\u0119 w zakresie rozwi\u0105za\u0144 marki ESET i jest odpowiedzialny za wspieranie sprzeda\u017cy na polskim rynku. Zajmuje si\u0119 rozwojem kana\u0142u partnerskiego, nadzoruje testy produktowe oraz bada potrzeby klient\u00f3w. Jest odpowiedzialny za prowadzenie wszelkich dzia\u0142a\u0144 maj\u0105cych na celu rozw\u00f3j produkt\u00f3w.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d137eb e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"2d137eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf0e57f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"bf0e57f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/PRU-2.jpg\" class=\"attachment-full size-full wp-image-397\" alt=\"\" srcset=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/PRU-2.jpg 500w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/PRU-2-300x300.jpg 300w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/PRU-2-150x150.jpg 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Pawe\u0142 Rutkowski - <br \/>product manager Safetica, <br \/>Dagma Bezpiecze\u0144stwo IT<\/h3><p class=\"elementor-image-box-description\">Specjalista w zakresie ochrony firmowych danych, odpowiedzialny za rozw\u00f3j rozwi\u0105zania klasy DLP \u2013 Safetica \u2013 na rynku polskim. Wspiera merytorycznie kana\u0142 partnerski, nadzoruje testy produktowe oraz aktywnie bada potrzeby rynku i klient\u00f3w. Zaanga\u017cowany w budowanie \u015bwiadomo\u015bci w obszarze cyberbezpiecze\u0144stwa danych wra\u017cliwych oraz ochrony tajemnicy przedsi\u0119biorstwa w \u015brodowisku biznesowym.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d12985c e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"d12985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c30cdec elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c30cdec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/KKC.jpg\" class=\"attachment-full size-full wp-image-396\" alt=\"\" srcset=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/KKC.jpg 500w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/KKC-300x300.jpg 300w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/KKC-150x150.jpg 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Konrad Krochmal, <br \/>Dagma Bezpiecze\u0144stwo IT<br \/><br \/><\/h3><p class=\"elementor-image-box-description\">Odpowiedzialny za rozw\u00f3j rozwi\u0105za\u0144 Segura na rynku polskim. Wspiera kana\u0142 partnerski w finalizowaniu proces\u00f3w sprzeda\u017cy oraz negocjacjach handlowych. Aktywnie bada potrzeby klient\u00f3w, prowadzi prezentacje dotycz\u0105c rozwi\u0105za\u0144 Segura podczas spotka\u0144 z klientami, nadzoruje testy oraz dzia\u0142ania wspomagaj\u0105ce rozw\u00f3j produktu.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7553f0c e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"7553f0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bf0b68 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7bf0b68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53d3e52 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"53d3e52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d383c1e e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"d383c1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b671ae elementor-widget elementor-widget-image\" data-id=\"9b671ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"813\" height=\"866\" src=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-15-kwi-2026-18_10_48-1.png\" class=\"attachment-large size-large wp-image-399\" alt=\"\" srcset=\"https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-15-kwi-2026-18_10_48-1.png 813w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-15-kwi-2026-18_10_48-1-282x300.png 282w, https:\/\/www.bumerank.pl\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-15-kwi-2026-18_10_48-1-768x818.png 768w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ce5b88 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"3ce5b88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8cb7e2 elementor-widget elementor-widget-text-editor\" data-id=\"f8cb7e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Czego dowiesz si\u0119 podczas webinaru?<\/strong><\/p><p>&#8211; czym r\u00f3\u017cni\u0105 si\u0119 obszary <strong>EDR\/XDR, DLP i PAM<\/strong> oraz jakie problemy pomagaj\u0105 rozwi\u0105za\u0107 w organizacji;<\/p><p>&#8211; jak <strong>ESET wspiera<\/strong> firmy w proaktywnym wykrywaniu zagro\u017ce\u0144, analizie incydent\u00f3w i reagowaniu na nie;<\/p><p>&#8211; w jaki spos\u00f3b <strong>Safetica pomaga<\/strong> chroni\u0107 dane przed nieautoryzowanym dost\u0119pem, kopiowaniem i wysy\u0142k\u0105 poza organizacj\u0119;<\/p><p>&#8211; jak <strong>Segura umo\u017cliwia<\/strong> zarz\u0105dzanie kontami uprzywilejowanymi, bezpieczne przechowywanie po\u015bwiadcze\u0144 i \u015bledzenie ich u\u017cycia;<\/p><p>&#8211; jak te rozwi\u0105zania mog\u0105 si\u0119 wzajemnie uzupe\u0142nia\u0107 w ramach jednej strategii bezpiecze\u0144stwa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8610efa e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"8610efa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-081632f e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"081632f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBERBEZPIECZE\u0143STWO Technologia to nasza druga natura Wykrywanie zagro\u017ce\u0144, kontrola dost\u0119pu i ochrona danych &#8211; 3 filary cyberbezpiecze\u0144stwa &#8212;-13 Maj godz 13.00 &#8212;-Zapisz si\u0119 &#8212;- Webinarium Szukasz sposobu na lepsz\u0105 ochron\u0119 firmowego \u015brodowiska IT, ale nie wiesz, od czego zacz\u0105\u0107? Podczas webinaru poka\u017cemy trzy uzupe\u0142niaj\u0105ce si\u0119 obszary cyberbezpiecze\u0144stwa: wykrywanie i analiz\u0119 zagro\u017ce\u0144 na stacjach roboczych, ochron\u0119 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"class_list":["post-395","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=\/wp\/v2\/pages\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=395"}],"version-history":[{"count":10,"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=\/wp\/v2\/pages\/395\/revisions"}],"predecessor-version":[{"id":412,"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=\/wp\/v2\/pages\/395\/revisions\/412"}],"wp:attachment":[{"href":"https:\/\/www.bumerank.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}