{"id":283,"date":"2022-06-23T14:21:15","date_gmt":"2022-06-23T14:21:15","guid":{"rendered":"https:\/\/securitybriefing.net\/?page_id=283"},"modified":"2025-09-08T20:40:33","modified_gmt":"2025-09-08T20:40:33","slug":"rolunk","status":"publish","type":"page","link":"https:\/\/securitybriefing.net\/hu\/rolunk\/","title":{"rendered":"R\u00f3lunk"},"content":{"rendered":"<p>A Security Briefing a vil\u00e1g els\u0151 \u00e9s legnagyobb k\u00f6z\u00f6ss\u00e9ge a vezet\u0151 inform\u00e1ci\u00f3biztons\u00e1gi tiszteknek (CISO-k) \u00e9s biztons\u00e1gi szakembereknek. Egyed\u00fcl\u00e1ll\u00f3 kever\u00e9ke vagyunk a gondolatvezet\u00e9snek \u00e9s az operat\u00edv mesters\u00e9gnek, \u00e1thidalva a kibert\u00e9rben l\u00e9v\u0151 szakad\u00e9kot. Olvas\u00f3inknak a legjobb szakembereket biztos\u00edtjuk az \u00fczletben, akik seg\u00edthetnek megv\u00e9deni legfontosabb digit\u00e1lis eszk\u00f6zeiket. A Security Briefing seg\u00edts\u00e9g\u00e9vel p\u00e1ratlan szak\u00e9rtelemhez f\u00e9rhet hozz\u00e1 a kiberbiztons\u00e1gi kock\u00e1zat\u00e9rt\u00e9kel\u00e9s, az incidensv\u00e1laszad\u00e1s \u00e9s a kriminalisztika ter\u00e9n. K\u00fcldet\u00e9s\u00fcnk, hogy biztos\u00edtsuk, hogy v\u00e1llalkoz\u00e1sa ne v\u00e1ljon adatv\u00e9delmi incidens vagy m\u00e1s kibert\u00e1mad\u00e1s \u00e1ldozat\u00e1v\u00e1. <\/p>\n\n\n\n<p>Meg\u00e9rtj\u00fck, hogy a kiberb\u0171n\u00f6z\u00e9s glob\u00e1lis probl\u00e9ma, amely glob\u00e1lis megold\u00e1st ig\u00e9nyel, ez\u00e9rt egyes\u00edtett\u00fck a vil\u00e1g legjobb elm\u00e9it, hogy seg\u00edts\u00fcnk cs\u00f6kkenteni a szervezeti kock\u00e1zati kitetts\u00e9get a kibervesz\u00e9lyekkel szemben. Sz\u00f6vets\u00e9gi tagjaink megosztj\u00e1k tud\u00e1sukat \u00e9s egy\u00fcttm\u0171k\u00f6dnek a megold\u00e1sokon, hogy \u00fcgyfeleinknek a megfelel\u0151 eszk\u00f6z\u00f6ket, folyamatokat \u00e9s technol\u00f3gi\u00e1kat biztos\u00edts\u00e1k v\u00e1llalkoz\u00e1saik v\u00e9delm\u00e9re. Az online k\u00f6rnyezet biztons\u00e1goss\u00e1 \u00e9s v\u00e9dett\u00e9 t\u00e9tel\u00e9re ir\u00e1nyul\u00f3 elk\u00f6telezetts\u00e9g\u00fcnk r\u00e9szek\u00e9nt speci\u00e1lis k\u00e9pz\u00e9si tanfolyamokat is k\u00edn\u00e1lunk az operat\u00edv \u00e9s strat\u00e9giai kiberbiztons\u00e1g ter\u00e9n, valamint h\u00e1l\u00f3zati lehet\u0151s\u00e9geket ipar\u00e1gi szak\u00e9rt\u0151k \u00e9s kiberbiztons\u00e1gi tan\u00e1csad\u00f3k sz\u00e1m\u00e1ra.<\/p>\n\n\n\n<p>Csatlakozzon hozz\u00e1nk, mik\u00f6zben azon dolgozunk, hogy biztos\u00edtsuk a kibert\u00e9r j\u00f6v\u0151j\u00e9t.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/profile.php?id=100083096924332\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<a class=\"twitter-timeline\" data-width=\"750\" data-height=\"1000\" data-dnt=\"true\" href=\"https:\/\/twitter.com\/scrtbriefing?ref_src=twsrc%5Etfw\">Tweetek a scrtbriefing-t\u0151l<\/a><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><strong>K\u00e9ppartnerek<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/depositphotos.com\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\" alt=\"Main logo black\" class=\"wp-image-4531\" style=\"width:218px;height:auto\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-300x75.png 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-768x192.png 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-18x5.png 18w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Security Briefing is the world\u2019s first and largest community of Chief Information Security Officers (CISOs) and security professionals. We are a unique blend of thought leadership and operational mastery, closing&hellip; <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/rolunk\/\">Folytat\u00e1s <span class=\"screen-reader-text\">R\u00f3lunk<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-283","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>About Us | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/rolunk\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Us | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Security Briefing is the world\u2019s first and largest community of Chief Information Security Officers (CISOs) and security professionals. We are a unique blend of thought leadership and operational mastery, closing&hellip; Continue reading About Us\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/rolunk\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-08T20:40:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/about-us\/\",\"url\":\"https:\/\/securitybriefing.net\/about-us\/\",\"name\":\"About Us | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\",\"datePublished\":\"2022-06-23T14:21:15+00:00\",\"dateModified\":\"2025-09-08T20:40:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/about-us\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"R\u00f3lunk | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/rolunk\/","og_locale":"hu_HU","og_type":"article","og_title":"About Us | Security Briefing","og_description":"Security Briefing is the world\u2019s first and largest community of Chief Information Security Officers (CISOs) and security professionals. We are a unique blend of thought leadership and operational mastery, closing&hellip; Continue reading About Us","og_url":"https:\/\/securitybriefing.net\/hu\/rolunk\/","og_site_name":"Security Briefing","article_modified_time":"2025-09-08T20:40:33+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Becs\u00fclt olvas\u00e1si id\u0151":"2 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/about-us\/","url":"https:\/\/securitybriefing.net\/about-us\/","name":"R\u00f3lunk | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/about-us\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/about-us\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png","datePublished":"2022-06-23T14:21:15+00:00","dateModified":"2025-09-08T20:40:33+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/about-us\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/about-us\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/about-us\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/about-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"About Us"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/pages\/283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":1,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/pages\/283\/revisions"}],"predecessor-version":[{"id":4532,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/pages\/283\/revisions\/4532"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}