Cybersecurity – Act no. 181/2014
We offer bodies and organisations that are subject to Act no. 181/2014 Coll., on cybersecurity, the independent and impartial verification of fulfilment of the requirements laid out in the act and related ordinances (chiefly Ordinance no. 82/2018 Coll., on cybersecurity). The purpose of certification is to increase trust and confirm compliance with with defined legislative requirements.
This audit is particularly suitable for:
- administrators and operators of information systems in critical information infrastructure
- administrators and operators of communication systems in critical information infrastructure
- administrators and operators of major information systems
- administrators and operators of information systems for basic services
- operators of basic services
- operators of digital services
- major suppliers to the above institutions
Sales

Ing. Lenka Mariánková
Product Manager
Technical specialist

Ing. Michal Hager
Head of Cyber Security Department
Why choose EZÚ?
EZÚ is one of the few certification bodies in the world that participates in the legislative process
We have a team of top experts and our own cybernetic laboratory.
EZÚ collaborates with CESNET.
We are a state body with a long history and the status of a qualified, trustworthy certification authority
We place considerable emphasis on the independence and impartiality of our auditors and the quality of the resulting outputs
Reasons to get certification
- Mapping of the current state of cybersecurity and identification of suggestions for improvement.
- Ensuring of cybersecurity and it continuous improvement.
- Protection from major financial losses and damage to or destruction of assets.
- Process improvement and acceleration (especially for IT services).
- Effective use of finances to ensure cybersecurity.
- Security of individual components of IT infrastructure (down to the level of firmware and microprocessors).
- Security of the supply chain.