{"id":328944,"date":"2021-05-31T12:09:28","date_gmt":"2021-05-31T10:09:28","guid":{"rendered":"https:\/\/www.informatika.si\/security-operations-center\/"},"modified":"2021-07-01T19:07:10","modified_gmt":"2021-07-01T17:07:10","slug":"security-operations-center","status":"publish","type":"page","link":"https:\/\/www.informatika.si\/en\/security-operations-center\/","title":{"rendered":"Security Operations Center"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.7.3&#8243; background_color=&#8221;#eeeeee&#8221; background_enable_color=&#8221;off&#8221; background_video_mp4=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2020\/12\/Circuit-27725.mp4&#8243; custom_padding=&#8221;75px||75px||true|false&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;5%&#8221; saved_tabs=&#8221;all&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.7.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;35px|||||&#8221; border_color_bottom=&#8221;#17223e&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; text_color=&#8221;light&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;|||on|||||&#8221; title_text_align=&#8221;center&#8221; title_font_size=&#8221;30px&#8221; title_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_intensity_slide=&#8221;2%&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;podatkovna-analitika&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;112px||112px||true|&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;#17223e&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>Providing cyber security in energy sector<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#dddddd&#8221; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Society as we know it is heavily dependent on technology. By protecting technological solutions, we protect people, their rights and property. But with the development of society and technology, also security paradigms are changing.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2021\/04\/varnost2.jpg&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; custom_padding=&#8221;122px||122px||true|&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>Cyber (in)security<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00B1C5&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221;]<\/p>\n<p>Automation, informatization, cybernetization and digital transformation of the business model bring many opportunities for companies. Unfortunately, they also bring risks and vulnerabilities that need to be managed effectively so as not to jeopardize the company\u2019s operations. Therefore comprehensive risk management is extremely important for the company as well as for the ecosystem in which the company operates.<\/p>\n<p>Cyber security is one of the areas of information security that overlaps with other aspects of security, such as physical, fire, digital, computer security, etc. Despite the division of security into areas, a holistic approach is necessary, as in practice attack vectors are not limited to just one area. Such an approach is not egoistic in nature, as it is based on cooperation in order to protect all stakeholders &#8211; in addition to the safety of an individual company, it makes sense to ensure the safety of all companies in the chain.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;94px||94px||true|&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;#17223e&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>Energy sector<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#dddddd&#8221; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>In the critical infrastructure ecosystem, energy is the second most exposed industry. Trends of intensive business digitalization and integration of operating and business systems increase exposure to cyber-attacks, so it is not only important but also necessary for energy stakeholders to establish a system of effective protection against cyber-attacks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;section&#8221; module_class=&#8221;blurb_22_f&#8221; _builder_version=&#8221;4.9.2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#eeeeee&#8221; background_color_gradient_end=&#8221;#ffffff&#8221; custom_padding=&#8221;116px||103px|||&#8221; top_divider_style=&#8221;mountains2&#8243;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#17223e&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>Threats of cyber-attacks for various areas of energy operations:<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00B1C5&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; admin_label=&#8221;Game Of Blurb Module&#8221; _builder_version=&#8221;4.9.2&#8243; max_width=&#8221;1178px&#8221; custom_padding=&#8221;||2vw||false|false&#8221; use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1178px&#8221; collapsed=&#8221;off&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Generation&#8221; image=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2021\/04\/001-windmill.png&#8221; admin_label=&#8221;Game Of Blurb Module 1 &#8211; Icon 79 x 79 pixels&#8221; _builder_version=&#8221;4.9.2&#8243; header_font=&#8221;Maven Pro|700|||||||&#8221; header_text_color=&#8221;#17223E&#8221; header_font_size=&#8221;20&#8243; header_line_height=&#8221;150%&#8221; custom_css_blurb_image=&#8221; text-align: left;|| margin-bottom: 38px;&#8221; custom_css_blurb_title=&#8221;||padding-bottom: 47px;|| position: relative;||&#8221;]<\/p>\n<p>Disruption of service and ransomware attacks against power plants and clean-energy generators.<\/p>\n<p><strong>Root cause:<\/strong> Legacy generation systems and clean-energy infrastructure designed without security in mind.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Transmission&#8221; image=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2021\/04\/002-electricity-tower.png&#8221; admin_label=&#8221;Game Of Blurb Module 2 &#8211; Icon 79 x 79 pixels&#8221; _builder_version=&#8221;4.9.2&#8243; header_font=&#8221;Maven Pro|700|||||||&#8221; header_text_color=&#8221;#17223E&#8221; header_font_size=&#8221;20&#8243; header_line_height=&#8221;150%&#8221; custom_css_blurb_image=&#8221; text-align: left;|| margin-bottom: 38px;&#8221; custom_css_blurb_title=&#8221;||padding-bottom: 47px;|| position: relative;||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Large-scale disruption of power to customers thru remotely disconnecting services.<\/p>\n<p><strong>Root cause:<\/strong> Physical security weaknesses allow access to grid control systems.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Distribution&#8221; image=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2021\/04\/003-distribution.png&#8221; admin_label=&#8221;Game Of Blurb Module 3 &#8211; Icon 79 x 79 pixels&#8221; _builder_version=&#8221;4.9.2&#8243; header_font=&#8221;Maven Pro|700|||||||&#8221; header_text_color=&#8221;#17223E&#8221; header_font_size=&#8221;20&#8243; header_line_height=&#8221;150%&#8221; custom_css_blurb_image=&#8221; text-align: left;|| margin-bottom: 38px;&#8221; custom_css_blurb_title=&#8221;||padding-bottom: 47px;|| position: relative;||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Disruption of substations that leads to regional loss of service and disruption of service to customers.<\/p>\n<p><strong>Root cause:<\/strong> Distributed power systems and limited security built into SCADA systems.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.2&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Network to users&#8221; image=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2021\/04\/004-house.png&#8221; admin_label=&#8221;Game Of Blurb Module 3 &#8211; Icon 79 x 79 pixels&#8221; _builder_version=&#8221;4.9.2&#8243; header_font=&#8221;Maven Pro|700|||||||&#8221; header_text_color=&#8221;#17223E&#8221; header_font_size=&#8221;20&#8243; header_line_height=&#8221;150%&#8221; custom_css_blurb_image=&#8221; text-align: left;|| margin-bottom: 38px;&#8221; custom_css_blurb_title=&#8221;||padding-bottom: 47px;|| position: relative;||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Theft of customer information, fraud and disruption of services.<\/p>\n<p><strong>Root cause:<\/strong> Large attack surface of IoT devices, including smart meters and electric vehicles.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;13px&#8221; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>Source<\/span>: <a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities\" target=\"_blank\" rel=\"noopener\">https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;#17223e&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>Active protection is necessary<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#dddddd&#8221; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Classic security solutions for passive protection of computer systems and information services are no longer sufficient. With the rapid development of technology and its widespread use, as well as due to changed patterns of operation of business and organizational systems and society in general, we are facing new threats and risks. Active security solutions that detect a cyber threat before it materializes are needed, as offered by Security Operations Centres (SOCs).<\/p>\n<p>For this purpose, we have established a functioning SOC, which already monitors security events for several companies in the energy sector as part of the proof-of-concept activity. Based on this, triage and incident analysis are performed, as well as the production of regular and ad-hoc reports. We are convinced that without operational centres that work effectively together, it will soon not be possible to ensure a sufficient level of security.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;ds-vertical-align&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.informatika.si\/wp-content\/uploads\/2021\/04\/varovanje-image.png&#8221; title_text=&#8221;varovanje image&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;#17223e&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>It\u2019s time to act<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#dddddd&#8221; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Informatika\u2019s experts in cooperation with domestic and foreign experts can help establish a modern system of active protection against cyber and other threats that may occur in business. Such protection was based on the key services of the Security Operations Centre:<\/p>\n<ul>\n<li>detecting and dealing with cyber security incidents,<\/li>\n<li>detection of vulnerabilities in information systems,<\/li>\n<li>conducting intrusion tests,<\/li>\n<li>establishment of bait systems,<\/li>\n<li>threat modelling,<\/li>\n<li>source code verification,<\/li>\n<li>checking for the presence of malicious code and analysing it,<\/li>\n<li>defining security starting points for information systems,<\/li>\n<li>reporting incidents to stakeholders and<\/li>\n<li>awareness raising and training.<\/li>\n<\/ul>\n<p>VOC ensures compliance with the legislation, damage reduction in the event of an incident and support for the business continuity of the company. Pooling around the sector security operations center ensures the establishment of domain-specific security methods that are more industry-specific and therefore more effective. We are using the latest technological solutions and top products from leading global manufacturers in building our SOC.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text module_class=&#8221;h2-under&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_2_text_color=&#8221;#17223e&#8221; custom_margin=&#8221;||19px||false|false&#8221;]<\/p>\n<h2>Why choose SOC by IINFORMATIKA?<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#dddddd&#8221; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.7.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100px&#8221; custom_margin=&#8221;||10px||false|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;16%&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<ul>\n<li>Decades of experience in developing, maintaining, renovating, and protecting of information systems.<\/li>\n<li>Deep insight into the energy sector.<\/li>\n<li>Adhering to ISO 27001 standard.<\/li>\n<li>Adaptation of the solution to the individual client.<\/li>\n<li>Flexibility of horizontal and vertical integration into the SOC.<\/li>\n<li>Hybrid approach.<\/li>\n<li>Collaboration with other security centers and stakeholders.<\/li>\n<li>Broader view and use of advanced security analytics.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#17223e&#8221; background_color_gradient_end=&#8221;#00b1c5&#8243; background_color_gradient_direction=&#8221;1deg&#8221; custom_padding=&#8221;1px||1px||true|false&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;10%&#8221; saved_tabs=&#8221;all&#8221;][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;54px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221;info@informatika.si&#8221; title=&#8221;Send an inquiry&#8221; custom_message=&#8221;Ime: %%Name%%||et_pb_line_break_holder||||et_pb_line_break_holder||Podjetje: %%podjetje%%||et_pb_line_break_holder||||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||||et_pb_line_break_holder||Sporocilo:||et_pb_line_break_holder||%%Message%%&#8221; success_message=&#8221;Thank you for your message. We will try to answer as soon as possible.&#8221; submit_button_text=&#8221;Send&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; form_field_background_color=&#8221;RGBA(0,0,0,0)&#8221; form_field_text_color=&#8221;#FFFFFF&#8221; form_field_focus_text_color=&#8221;#FFFFFF&#8221; form_field_custom_padding=&#8221;8px||8px||true|false&#8221; title_font=&#8221;|700||on|||||&#8221; title_text_color=&#8221;#FFFFFF&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#17223e&#8221; button_border_radius=&#8221;100px&#8221; border_width_bottom=&#8221;3px&#8221; border_color_bottom=&#8221;#FFFFFF&#8221; border_color_left=&#8221;#17223e&#8221; button_bg_color__hover_enabled=&#8221;on|desktop&#8221; border_width_left__hover_enabled=&#8221;off|desktop&#8221; form_field_background_color__hover_enabled=&#8221;off|hover&#8221; border_width_bottom__hover_enabled=&#8221;off|desktop&#8221; border_width_bottom__hover=&#8221;1px&#8221; border_width_left__hover=&#8221;4px&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;First and last name&#8221; required_mark=&#8221;off&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.9.2&#8243; border_color_all=&#8221;#00B1C5&#8243; border_width_bottom=&#8221;3px&#8221; border_color_bottom=&#8221;#FFFFFF&#8221; border_color_left=&#8221;#00B1C5&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; border_width_left__hover_enabled=&#8221;off|hover&#8221; border_width_left__hover=&#8221;6px&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;podjetje&#8221; field_title=&#8221;Company&#8221; required_mark=&#8221;off&#8221; _builder_version=&#8221;4.9.2&#8243; border_color_left=&#8221;#00B1C5&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; border_width_left__hover_enabled=&#8221;off|hover&#8221; border_width_left__hover=&#8221;6px&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Email&#8221; field_type=&#8221;email&#8221; _builder_version=&#8221;4.9.2&#8243; border_color_left=&#8221;#00B1C5&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; border_width_left__hover_enabled=&#8221;off|desktop&#8221; border_width_left__hover=&#8221;6px&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Message&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.9.2&#8243; border_color_left=&#8221;#00B1C5&#8243; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; border_width_left__hover_enabled=&#8221;off|hover&#8221; border_width_left__hover=&#8221;6px&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;GDPR&#8221; field_title=&#8221;Privacy Policy&#8221; field_type=&#8221;checkbox&#8221; checkbox_options=&#8221;%91{%22value%22:%22I consent to having this website store my submitted information so they can respond to my inquiry.%22,%22checked%22:0,%22dragID%22:-1}%93&#8243; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; form_field_font_size=&#8221;12px&#8221; background_enable_color=&#8221;off&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#FFFFFF&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Providing cyber security in energy sectorSociety as we know it is heavily dependent on technology. By protecting technological solutions, we protect people, their rights and property. But with the development of society and technology, also security paradigms are changing.Cyber (in)securityAutomation, informatization, cybernetization and digital transformation of the business model bring many opportunities for companies. Unfortunately, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_seopress_analysis_target_kw":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-328944","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/pages\/328944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/comments?post=328944"}],"version-history":[{"count":5,"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/pages\/328944\/revisions"}],"predecessor-version":[{"id":329194,"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/pages\/328944\/revisions\/329194"}],"wp:attachment":[{"href":"https:\/\/www.informatika.si\/en\/wp-json\/wp\/v2\/media?parent=328944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}