Cybersecurity – Act no. 181/2014

We offer bodies and organisations that are subject to Act no. 181/2014 Coll., on cybersecurity, the independent and impartial verification of fulfilment of the requirements laid out in the act and related ordinances (chiefly Ordinance no. 82/2018 Coll., on cybersecurity). The purpose of certification is to increase trust and confirm compliance with with defined legislative requirements.

This audit is particularly suitable for:

  • administrators and operators of information systems in critical information infrastructure
  • administrators and operators of communication systems in critical information infrastructure
  • administrators and operators of major information systems
  • administrators and operators of information systems for basic services
  • operators of basic services
  • operators of digital services
  • major suppliers to the above institutions


Ing. Lenka Mariánková

Ing. Lenka Mariánková

Product Manager

Technical specialist

Ing. Michal Hager

Ing. Michal Hager

Head of Cyber Security Department

Poptávkový formulář - detail produktu EN

Write to us


Maximum file size: 3MB


Why choose EZÚ?

  • EZÚ is one of the few certification bodies in the world that participates in the legislative process

  • We have a team of top experts and our own cybernetic laboratory.

  • EZÚ collaborates with CESNET.

  • We are a state body with a long history and the status of a qualified, trustworthy certification authority

  • We place considerable emphasis on the independence and impartiality of our auditors and the quality of the resulting outputs

Reasons to get certification

  • Mapping of the current state of cybersecurity and identification of suggestions for improvement.
  • Ensuring of cybersecurity and it continuous improvement.
  • Protection from major financial losses and damage to or destruction of assets.
  • Process improvement and acceleration (especially for IT services).
  • Effective use of finances to ensure cybersecurity.
  • Security of individual components of IT infrastructure (down to the level of firmware and microprocessors).
  • Security of the supply chain.