Our world is constantly changing – improving and evolving. Same as the world, Cyber Security is changing everyday and we need to always stay up to date with the latest changes to protect ourselves from possible attacks and breaches. We can help you evaluate your current IT Security level and implement changes and improvements with the following services:
Security audits include a variety of separate services where we can help you conduct audits, analyses or in-depth investigations on data or processes to identify potential threats, flaws or breaches in your IT environment, products and solutions.
Take control of who, what and how information is handled in your organization. By working with “least privilege”, keeping track of devices, log collection and what is going on in the network as well as making sure that your firewalls are correctly configured, you can increase your level of maturity and therefore reduce the risk of attacks
Threat modelling aims to help you and your development team analyze your product or solution from the perspective of a hypothetical attacker. To identify potential threats, vulnerabilities or flaws as early as possible in your development cycle.
If you have self-developed projects that you sell to your customers, it is of utmost importance to ensure that the product is safe for use. Our experts have extensive experience in reviewing products and helping with secure coding that minimizes vulnerable code in the production environment.
Analysis of network equipment
In most organizations, situations can arise where the IT systems have grown to such a level that you have lost control of what exists in the network, or where parts of the components have started to fail or create problems. By conducting a network equipment analysis, you can quickly identify where improvements are needed in your organization.
Today, a variety of techniques are used to carry out breaches. Reverse engineering makes it possible to identify the methods used to prevent future attacks. This can include reviewing malware that you have had on your network and reviewing software – either third party or proprietary.
Vulnerability scanning is an optimal option for environments that have never been penetration tested before, as untested environments usually carry serious security flaws. We recommend that, in these scenarios, you start with a vulnerability scan and, after addressing the reported issues, follow up with a penetration test.
If you suspect or have evidence of a breach, it is essential to act according to a well-thought-out strategy. It is common to panic and take drastic action without knowing the consequences, which can have undesirable or worsening effects. The experience of our security specialists will help you conduct a methodical and structured investigation to identify and recover from a variety of threats.
After conducting a good security audit and understanding the potential risks and threats that your business can be affected by, it is important to take a step further and implement new policies, guidelines and procedures in place, to avoid exactly that.
We support you in creating, planning and implementing new concepts to help you protect your IT Infrastructure and overall business.
TECHNICAL AND ORGANIZATIONAL MEASURES
EMERGENCY AND CRISIS PREPAREDNESS
Andreas is a full stack developer with an emphasis on frontend who likes new technology. He has experience in various programming languages, technologies, industries and platforms - from mobile to application and web. In previous assignments, he has also worked in both Scrum and SAFe.
Andreas RothCyber Security Specialist
Aron's expertise is network security and he has extensive experience with Fortinet's security solutions.
He is adept at Advanced Threat Projection and firewalls and likes new challenges
Aron TydénCyber Security Consultant
Jesper is a committed and passionate IT security specialist with several years of industry experience. who has worked in multiple sectors within IT. He is driven, inventive and likes to enhance the strengths of his colleagues and completes a team with his good humor.
Jesper CzapnikCybers Security Consultant
Jesse likes new challenges and is always aiming to learning and develop new skills. He has experience from various fast-paced projects and can easily juggle several simultaneous tasks. He is a relaxed person who has a calming effect on the team.
Jesse WatsonSenior Cyber Security Specialist
Jon is a driven, inclusive and passionate IT security specialist who always has a smile on his face. Throughout his years as a professional IT security expert, he has worked in most sectors and is a skilled presenter for both small and large groups.
Jon JezierskiSenior Cyber Security Specialist
Mattias is a smiling guy who laughs a lot and appreciates meeting and including new people. During his time in IT security, he has worked globally and traveled the world to perform a variety of penetration tests.
Mattias DöjSenior Cyber Security Specialist
Patrik has many years of experience working with IT security from multiple perspectives. His technical knowledge is both deep and broad as his curiosity and creative ability easily take on new tasks. Over the years, he has had time to work in several different sectors where he had several different areas of responsibility.
Patrik JezierskiSenior Cyber Security Specialist
A security enthusiast, and a certified CISSP. Martin´s mission is to expand Information Security Consulting across the DACH Region, ensuring our customers are well-protected.
Martin BischoffHead of Information Security DACH
How to think and work with application security
Most of us understand that security is important but don’t really know how and where to start. In this webinar, we will talk about application security with a focus on bringing security into the development process, the common attacks, etc.