{"id":3279,"date":"2025-09-05T18:00:00","date_gmt":"2025-09-05T17:00:00","guid":{"rendered":"https:\/\/www.cikom.com\/?p=3279"},"modified":"2025-09-05T14:13:27","modified_gmt":"2025-09-05T13:13:27","slug":"kriticna-infrastruktura-kao-instrument-meke-moci","status":"publish","type":"post","link":"https:\/\/www.cikom.com\/en\/kriticna-infrastruktura-kao-instrument-meke-moci\/","title":{"rendered":"Kriti\u010dna infrastruktura kao instrument meke mo\u0107i"},"content":{"rendered":"<p>\ud83d\udd35 Kriti\u010dna infrastruktura kao instrument meke mo\u0107i<br><br>U vremenu kada se nacionalna i regionalna bezbjednost sve vi\u0161e suo\u010davaju sa sajber prijetnjama, hibridnim napadima i prirodnim katastrofama, za\u0161tita kriti\u010dne infrastrukture postaje pitanje od strate\u0161kog zna\u010daja.<br>Zajedno sa Atlantic Council of Montenegro i Centrom za analizu rizika i upravljanje krizama, imali smo priliku da budemo dio panela na kojem su se okupili predstavnici dr\u017eavnih institucija, regulatornih tijela, privatnog sektora i akademske zajednice.<br><br>\ud83d\udc49 Razgovarali smo o:<br>uticaju kriti\u010dne infrastrukture bez granica<br>balansu izme\u0111u kontrole i suvereniteta<br>energiji, vodi i mre\u017eama kao stubovima stabilnosti<br>konceptu \u201emo\u0107i bez oru\u017eja\u201c i liniji izme\u0111u stabilnosti i haosa<br><br>Na\u0161 kolega Ivan Stankovic istakao je va\u017enost prilago\u0111avanja kompanija novim regulativama poput NIS2, DORA i Zakona o informacionoj bezbjednosti. Poseban akcenat stavio je na to da \u0107e firme koje budu dio kriti\u010dne infrastrukture morati da se fokusiraju na SOC servise doma\u0107ih kompanija koje imaju adekvatnu ekspertizu i stru\u010dne ljude da iznesu taj zadatak.<br><br>Na ovu poruku nadovezao se i na\u0161 CEO Vladan Taba\u0161, nagla\u0161avaju\u0107i da je upravo u tome snaga lokalnih rje\u0161enja i partnerstava koja mogu obezbijediti odr\u017eivu i sigurnu budu\u0107nost. Vladan je dodao da je cyber security klju\u010dan segment za kriti\u010dnu infrastrukturu, jer i na taj na\u010din mo\u017ee postati \u201einstrument meke mo\u0107i\u201c. Posebno je istakao da \u010cikom posjeduje ISO sertifikate i rje\u0161enja za obradu podataka nivoa \u201ctajno\u201d, \u0161to dodatno potvr\u0111uje na\u0161u spremnost da odgovorimo na najvi\u0161e standarde bezbjednosti.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"683\" height=\"1024\" data-id=\"3287\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora3-683x1024.jpg\" alt=\"\" class=\"wp-image-3287\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora3-683x1024.jpg 683w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora3-200x300.jpg 200w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora3-768x1152.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora3-8x12.jpg 8w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora3.jpg 982w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"683\" height=\"1024\" data-id=\"3286\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora2-683x1024.jpg\" alt=\"\" class=\"wp-image-3286\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora2-683x1024.jpg 683w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora2-200x300.jpg 200w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora2-768x1152.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora2-8x12.jpg 8w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora2.jpg 982w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"683\" height=\"1024\" data-id=\"3284\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora8-683x1024.jpg\" alt=\"\" class=\"wp-image-3284\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora8-683x1024.jpg 683w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora8-200x300.jpg 200w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora8-768x1152.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora8-8x12.jpg 8w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora8.jpg 1000w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" data-id=\"3280\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora4-683x1024.jpg\" alt=\"\" class=\"wp-image-3280\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora4-683x1024.jpg 683w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora4-200x300.jpg 200w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora4-768x1152.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora4-8x12.jpg 8w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora4.jpg 1000w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" data-id=\"3283\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora7-683x1024.jpg\" alt=\"\" class=\"wp-image-3283\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora7-683x1024.jpg 683w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora7-200x300.jpg 200w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora7-768x1152.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora7-8x12.jpg 8w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora7.jpg 1000w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"1000\" data-id=\"3282\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora6.jpg\" alt=\"\" class=\"wp-image-3282\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora6.jpg 800w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora6-240x300.jpg 240w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora6-768x960.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora6-10x12.jpg 10w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" data-id=\"3285\" src=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora-683x1024.jpg\" alt=\"\" class=\"wp-image-3285\" srcset=\"https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora-683x1024.jpg 683w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora-200x300.jpg 200w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora-768x1152.jpg 768w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora-8x12.jpg 8w, https:\/\/www.cikom.com\/wp-content\/uploads\/2025\/09\/cybersecurity_crna_gora.jpg 982w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><br>\u010cikom, sa preko tri decenije iskustva u oblasti IT infrastrukture i sajber bezbjednosti, nastavlja da aktivno doprinosi razvoju odr\u017eivih i integrisanih sistema za\u0161tite.<\/p>","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd35 Kriti\u010dna infrastruktura kao instrument meke mo\u0107i U vremenu kada se nacionalna i regionalna bezbjednost sve vi\u0161e suo\u010davaju sa sajber prijetnjama, hibridnim napadima i prirodnim katastrofama, za\u0161tita kriti\u010dne infrastrukture postaje pitanje od strate\u0161kog zna\u010daja.Zajedno sa Atlantic Council of Montenegro i Centrom za analizu rizika i upravljanje krizama, imali smo priliku da budemo dio panela na [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3281,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[14],"tags":[],"class_list":["post-3279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-novosti"],"_links":{"self":[{"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/posts\/3279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/comments?post=3279"}],"version-history":[{"count":1,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/posts\/3279\/revisions"}],"predecessor-version":[{"id":3288,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/posts\/3279\/revisions\/3288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/media\/3281"}],"wp:attachment":[{"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/media?parent=3279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/categories?post=3279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cikom.com\/en\/wp-json\/wp\/v2\/tags?post=3279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}