{"id":1552924,"date":"2026-03-17T09:49:36","date_gmt":"2026-03-17T08:49:36","guid":{"rendered":"https:\/\/blog.wedos.com\/?p=1552924"},"modified":"2026-03-30T11:05:23","modified_gmt":"2026-03-30T09:05:23","slug":"20-rocnik-it-security-workshop-12-3-2026","status":"publish","type":"post","link":"https:\/\/blog.wedos.com\/cs\/20-rocnik-it-security-workshop-12-3-2026","title":{"rendered":"20. ro\u010dn\u00edk IT Security Workshop, 12. 3. 2026"},"content":{"rendered":"\n<p>P\u0159edn\u00e1\u0161ej\u00edc\u00ed: <strong>Luk\u00e1\u0161 Kos<\/strong><br>Nad r\u00e1mec hardwaru:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pro\u010d va\u0161e ochrana proti DDoS m\u016f\u017ee<br>selhat je\u0161t\u011b p\u0159ed va\u0161\u00edm datacentrem<\/h2>\n\n\n\n<p>Minul\u00fd \u010dtvrtek jsme na konferenci ITSW v Praze p\u0159edn\u00e1\u0161eli o kritick\u00e9m t\u00e9matu: <strong>evoluci volumetrick\u00fdch DDoS \u00fatok\u016f<\/strong>. Zat\u00edmco d\u0159\u00edve byly tyto \u00fatoky v\u00fdjime\u010dn\u00e9, dne\u0161n\u00ed data ukazuj\u00ed, \u017ee se objevuj\u00ed st\u00e1le \u010dast\u011bji a jsou siln\u011bj\u0161\u00ed. Riziko saturace <strong>upstreamu <\/strong>je v\u0161ak \u010dasto podce\u0148ovan\u00fdm faktorem.<\/p>\n\n\n\n<!--more-->\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e8a15748d7d&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e8a15748d7d\" class=\"wp-block-image size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" data-src=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-01-1024x768.jpg\" alt=\"\" class=\"wp-image-1552934 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-01-1024x768.jpg 1024w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-01-300x225.jpg 300w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-01-768x576.jpg 768w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-01-1536x1152.jpg 1536w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-01-scaled.jpg 2048w\" data-sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/768;\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Zv\u011bt\u0161it\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p><strong>Hrozba v \u010d\u00edslech: Rekordy, kter\u00e9 nikdo nechce p\u0159ekon\u00e1vat<\/strong><br>Podle ENISA (Evropsk\u00e1 agentura pro kyberbezpe\u010dnost) Threat Landscape 2024 tvo\u0159ily DDoS \u00fatoky 41,1 % hl\u00e1\u0161en\u00fdch incident\u016f. V roce 2025 tento pod\u00edl vzrostl na <strong>alarmuj\u00edc\u00edch 81,4 %<\/strong>. Nejde v\u0161ak jen o \u010detnost, ale p\u0159edev\u0161\u00edm o s\u00edlu. V dubnu lo\u0148sk\u00e9ho roku jsme mluvili o \u00fatoc\u00edch o s\u00edle 6,5 Tbps, v \u0159\u00edjnu u\u017e sv\u011btov\u00fd rekord dos\u00e1hl 29,5 Tbps. Jen b\u011bhem lo\u0148sk\u00e9ho roku byl sv\u011btov\u00fd rekord p\u0159ekon\u00e1n p\u011btkr\u00e1t.<\/p>\n\n\n\n<p>V \u010cesk\u00e9 republice dr\u017e\u00ed smutn\u00e9 prvenstv\u00ed \u00fatok na O2 z roku 2022 s v\u00edce ne\u017e 200 Gbps. Infrastruktura WEDOS \u010delila ve stejn\u00e9m roce \u0161pi\u010dce 190 Gbps. Pr\u00e1v\u011b tyto zku\u0161enosti n\u00e1s vedly k vybudov\u00e1n\u00ed <a href=\"http:\/\/wedos.protection\/\" target=\"_blank\" rel=\"noopener\"><strong>WEDOS Global Protection (WGP)<\/strong><\/a>.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e8a15749b2f&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e8a15749b2f\" class=\"wp-block-image size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" data-src=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-02-1024x768.jpg\" alt=\"\" class=\"wp-image-1552946 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-02-1024x768.jpg 1024w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-02-300x225.jpg 300w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-02-768x576.jpg 768w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-02-1536x1152.jpg 1536w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-02-scaled.jpg 2048w\" data-sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/768;\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Zv\u011bt\u0161it\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p><strong>Kritick\u00e9 m\u00edsto selh\u00e1n\u00ed: Saturace upstreamu<\/strong><br>Mnoho firem investuje miliony do \u0161pi\u010dkov\u00fdch on-premise \u0159e\u0161en\u00ed. Tato za\u0159\u00edzen\u00ed jsou vynikaj\u00edc\u00ed pro \u010di\u0161t\u011bn\u00ed provozu, maj\u00ed v\u0161ak jednu z\u00e1sadn\u00ed slabinu: <strong>saturaci upstreamu<\/strong>. Pokud \u00fato\u010dn\u00edk zahlt\u00ed va\u0161i p\u0159\u00edpojnou linku masivn\u00edm tokem dat (volumetrick\u00fd \u00fatok), provoz se k va\u0161emu firewallu ani nedostane. Linka je &#8222;ucpan\u00e1&#8220; d\u0159\u00edve, ne\u017e hardware m\u016f\u017ee za\u010d\u00edt filtrovat.<\/p>\n\n\n\n<p>WGP tento probl\u00e9m \u0159e\u0161\u00ed pomoc\u00ed glob\u00e1ln\u00ed Anycast s\u00edt\u011b s v\u00edce ne\u017e 120 PoP (Points of Presence) a 3000 servery. Architektura sd\u00edlen\u00e9 IP adresy rozlo\u017e\u00ed masivn\u00ed \u00fatok na mal\u00e9 fragmenty a \u010dist\u00ed jej p\u0159\u00edmo u zdroje, \u010d\u00edm\u017e chr\u00e1n\u00ed va\u0161i konektivitu.<\/p>\n\n\n\n<p><strong>\u010cast\u00e9 m\u00fdty o ochran\u011b<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>&#8222;M\u016fj hosting m\u011b ochr\u00e1n\u00ed&#8220;:<\/strong> Hostingov\u00ed poskytovatel\u00e9 chr\u00e1n\u00ed infrastrukturu proti b\u011b\u017en\u00fdm \u00fatok\u016fm. Proti c\u00edlen\u00fdm, st\u00e1tem sponzorovan\u00fdm nebo masivn\u00edm hacktivistick\u00fdm kampan\u00edm s botnety v\u0161ak b\u011b\u017en\u00e1 ochrana hostingu nesta\u010d\u00ed.<\/li>\n\n\n\n<li><strong>&#8222;Mus\u00edm m\u011bnit st\u00e1vaj\u00edc\u00ed hardware&#8220;:<\/strong> WGP lze jednodu\u0161e p\u0159edsadit p\u0159ed va\u0161e st\u00e1vaj\u00edc\u00ed \u0159e\u0161en\u00ed. M\u016f\u017eeme dokonce filtrovat jen L3\/L4 vrstvu a &#8222;\u010dist\u00fd&#8220; provoz nechat k dal\u0161\u00ed anal\u00fdze va\u0161emu intern\u00edmu syst\u00e9mu na L7.<\/li>\n\n\n\n<li><strong>&#8222;Mus\u00edm m\u00edt u WEDOS hosting nebo dom\u00e9nu&#8220;:<\/strong> WGP je nez\u00e1visl\u00e1 slu\u017eba. M\u016f\u017eete m\u00edt hosting i dom\u00e9ny kdekoli na sv\u011bt\u011b a p\u0159esto vyu\u017e\u00edvat na\u0161i ochranu.<\/li>\n<\/ol>\n\n\n\n<p><strong>Evropsk\u00e1 suverenita a bezpe\u010dnost dat<\/strong><br>Na rozd\u00edl od 90 % konkurence s&nbsp;Anycast technologi\u00ed je WEDOS \u010dist\u011b evropsk\u00e1 spole\u010dnost. To znamen\u00e1:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u017d\u00e1dn\u00fd US Cloud Act:<\/strong> Va\u0161e data nepodl\u00e9haj\u00ed americk\u00fdm z\u00e1kon\u016fm o p\u0159\u00edstupu k informac\u00edm.<\/li>\n\n\n\n<li><strong>Pln\u00e1 shoda s NIS2 a GDPR.<\/strong><\/li>\n\n\n\n<li><strong>De\u0161ifrov\u00e1n\u00ed pouze v EU:<\/strong> U politicky \u010di strategicky citliv\u00fdch dat je nep\u0159\u00edpustn\u00e9, aby de\u0161ifrov\u00e1n\u00ed a anal\u00fdza prob\u00edhaly mimo jurisdikci EU. WGP garantuje, \u017ee k t\u011bmto proces\u016fm doch\u00e1z\u00ed v\u00fdhradn\u011b na \u00fazem\u00ed Evropsk\u00e9 unie.<\/li>\n<\/ul>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e8a1574a8b6&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e8a1574a8b6\" class=\"wp-block-image size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"461\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" data-src=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-03-1024x461.jpg\" alt=\"\" class=\"wp-image-1552960 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-03-1024x461.jpg 1024w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-03-300x135.jpg 300w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-03-768x346.jpg 768w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-03-1536x691.jpg 1536w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2026\/03\/IT-Security-Workshop-03-scaled.jpg 2048w\" data-sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/461;\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Zv\u011bt\u0161it\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p><strong>Z\u00e1v\u011bre\u010dn\u00e1 doporu\u010den\u00ed pro IT management<\/strong><br>Prov\u011b\u0159te si odolnost sv\u00e9ho \u0159e\u0161en\u00ed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Jak je o\u0161et\u0159eno riziko saturace upstreamu?<\/li>\n\n\n\n<li>Jak\u00e9 je va\u0161e certifikovan\u00e9 DRS (DDoS Resiliency Score)? WGP aktu\u00e1ln\u011b dr\u017e\u00ed 5\/5 od ZeroBS a po upgradu sm\u011b\u0159ujeme k Level 6.<\/li>\n\n\n\n<li>Kde fyzicky a pod jakou jurisdikc\u00ed kon\u010d\u00ed va\u0161e \u0161ifrovan\u00e1 data?<\/li>\n<\/ul>\n\n\n\n<p>Infrastruktura nen\u00ed jen o rychlosti, ale o suverenit\u011b a odolnosti, kterou nelze outsourcovat na subjekty mimo EU bez bezpe\u010dnostn\u00edho rizika.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>P\u0159edn\u00e1\u0161ej\u00edc\u00ed: Luk\u00e1\u0161 KosNad r\u00e1mec hardwaru: Pro\u010d va\u0161e ochrana proti DDoS m\u016f\u017eeselhat je\u0161t\u011b p\u0159ed va\u0161\u00edm datacentrem Minul\u00fd \u010dtvrtek jsme na konferenci ITSW v Praze p\u0159edn\u00e1\u0161eli o kritick\u00e9m t\u00e9matu: evoluci volumetrick\u00fdch DDoS \u00fatok\u016f. Zat\u00edmco d\u0159\u00edve byly tyto \u00fatoky v\u00fdjime\u010dn\u00e9, dne\u0161n\u00ed data ukazuj\u00ed, \u017ee se objevuj\u00ed st\u00e1le \u010dast\u011bji a jsou siln\u011bj\u0161\u00ed. Riziko saturace upstreamu je v\u0161ak \u010dasto podce\u0148ovan\u00fdm &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.wedos.com\/cs\/20-rocnik-it-security-workshop-12-3-2026\" class=\"more-link\">Pokra\u010dovat ve \u010dten\u00ed<span class=\"screen-reader-text\"> &#8222;20. ro\u010dn\u00edk IT Security Workshop, 12. 3. 2026&#8220;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":1552934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[112,75,9,101],"tags":[],"class_list":["post-1552924","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezpecnost","category-konference-a-srazy","category-technologie","category-udalosti"],"_links":{"self":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts\/1552924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/comments?post=1552924"}],"version-history":[{"count":4,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts\/1552924\/revisions"}],"predecessor-version":[{"id":1571003,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts\/1552924\/revisions\/1571003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/media\/1552934"}],"wp:attachment":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/media?parent=1552924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/categories?post=1552924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/tags?post=1552924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}