Cyber Services Plc 2015. BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Conflict Early Warning System January 8, 2014 MYANMAR PEACE CENTER.
Twinning: doing together Director Anneli Temmes Finnish Institute of Public Management 10 February 20.
The new Hungarian cybersecurity landscape Dr. Ferenc Suba Vice-Chair, European Network and Information Security Agency Chairman, National CERT Working.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Training Institute of Public Administration Tirana, ALBANIA
Speaker: Tamar Shapatava
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
APAC Defense Forum Learning and IT Capacity Building for Defense Sector.
Hands-On Ethical Hacking and Network Defense
Project: EU-Georgia E-Governance Facility GITI 2014 November 6 – 7, 2014 Kostas Drakas Team Leader In cooperation with.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
3rd Information Security and Cyber Defence Conference Ms. Anett MÁDI-NÁTOR National Security Authority of Hungary Head of Information Security Awareness.
Diana Zarazua Employee Learning Director Alcatel-Lucent University Shifting the Emphasis from Training to Learning ECU Forum London (Feb 10-11)
15 April Fostering Entrepreneurship among young people through education: a EU perspective Simone Baldassarri Unit “Entrepreneurship” Forum “Delivering.
Website Hardening HUIT IT Security | Sep
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
NATO TALENT MANAGEMENT
Test Roles and Independence of Testing Telerik Software Academy Software Quality Assurance.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
1 Reference Framework for Sustainable Cities (RFSC) Some useful functionalities for Finnish cities.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
ACTION PLAN ON SOCIAL DIALOGUE Lithuanian apparel and textile industry Jovita Meškauskienė, Lithuanian industry enterprises Trade Union “Solidarumas” Algimantas.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
North-West Agency of International Projects Promoting HRD, developing networks.
EFDRR Our Goal… Good HFA Exchanges 1.Describe some exchanges that have taken place and any results. 2.Analyse the results of the questionnaire. 3.Make.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
The industrial relations in the Commerce sector EU Social dialogue: education, training and skill needs Ilaria Savoini Riga, 9 May 2012.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Safe’n’Sec IT security solutions for enterprises of any size.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Generic competencesDescription of the Competence Learning Competence The student  possesses the capability to evaluate and develop one’s own competences.
We build a „Virtual Dome"
DS Cyber Security for SMEs, local public administration and Individuals Dr. William Hynes Future Analytics Consulting (FAC)
TRAINING OPTIONS AT CYBER SERVICES PLC Anett Mádi-Nátor, Director of International Operations Ferenc Frész, CEO.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Regional Cyber Crime Unit
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
© Copyright Richard Dealtry th & 10 th February 2012 Revolutionary Corporate University Forum Web:
University of Piraeus Research Centre (UPRC) Assistant Professor Nineta Polemi “PREVENTION, PREPAREDENESS AND CONSEQUENCE MANAGEMENT OF.
Mgt Project Portfolio Management and the PMO Module 8 - Fundamentals of the Program Management Office Dr. Alan C. Maltz Howe School of Technology.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Information Security Program
Test Roles and Independence of Testing
Careers in Cyber Security
Cyber Defence Intelligence
Training the Future Cyber Security Specialist: A Novel Approach
5G Security Training
National Cyber Security
Cyber Security professions Overview
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Elections Systems: Designated Critical Infrastructure
Microsoft Data Insights Summit
In the attack index…what number is your Company?
CEng progression through the IOM3
Presentation transcript:

Cyber Services Plc 2015

BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources available:  10+ Senior consultants  20+ Developers  20+ Testers  Qualifications of the team  9 Certified Ethical Hacker (KCEHA)  3 International CEH  4 Offensive Security Certified Professional (OSCP)  Services:  Ethical hacking  Cyber threat analysis  Cyber (defence) exercises (planning, execution)  Multi-level information security awareness trainings – Gamification  Information security and IT security courses, development  Reputation management  Key references  NATO  UAE Dubai  ZAIN Kuwait  EU Council  Hungarian Government

KEY EXPERTS Anett Mádi-Nátor Director of International Operations  Senior cyber security expert (strategic, administrative) and trainer  10 years working experience for government, NATO, European Union, and private sector incl. critical information infrastructure (approx. 400 projects on 5 (sub)continents)  Recent positions include HUN MilCIRC Head of Coordination, NATO Cyber Defence Capability Team Chair, NATO Cyber Coalition Exercises Core Stategic and Administrative Planner  HUN NSA CDMA Administrative Head  KÜRT Ethical Hacking Course Lead of Strategic Communication and Project Management Module Ferenc Frész CEO  Senior cyber security expert (strategic, technical) and trainer  Approx. 20 years working experience for government, NATO, European Union, and private sector incl. critical information infrastructure (more than 1400 projects on 5 (sub)continents)  Recent positions include HUN MilCIRC Technical Head, HUN National Rep. to NATO Cyber Defence Capability Team, NATO Cyber Coalition Exercises Core Technical Planner  HUN NSA CDMA Head, Founder and Lead Trainer of KÜRT Ethical Hacking Course

THE TEAM Resources  10+ Senior consultants, advisors  20+ Developers  20+ Tester s Qualifications  9 Certified Ethical Hacker (KCEHA)  3 International CEH  4 Offensive Security Certified Professional (OSCP) Core competencies  Analysis of complex IT systems  Hardening project professional support  IT and information security expert activity  Information security process support  Planning and management of IT projects  System design and documentation  Development  Incident management (log analysis, log management, and investigating network activities)  Supervision of qualified IT networks  Installation and support of qualified servers  Testing

ETHICAL HACKING  Black Box, Grey Box, White Box testing  External infrastructure testing  Internal infrastructure testing  Web application testing  Mobile network testing (3G, 4G, Wi-fi, etc.)  Automated, manual, and hybrid vulnerability assessments  High profile targeted tests for special purposes  Applied methodology may include steps as  Reconnaissance  Scanning  Testing  (Exploitation)  Report of findings - documentation

CYBER THREAT ANALYSIS  Focuses on revealing and identifying modern, so called asymmetric threat actors  Enables proactive decision making  Enables identifying and analysing hacktivist teams, hacker groups and state sponsored malicious threat actors  Gives ability to protect and to prepare for any potential cyber attacks.

CYBER DEFENCE EXERCISE  Cyber (defence) exercises serve the purpose of testing, developing, and training the ability of organisations and commercial entities to defend their networks and information protection systems from various challenges that those are to face when operating in the virtual space.  A well-developed cyber exercise tests systems and networks to make sure that those are able to keep pace with evolving threats. The human factor matters as well, as exercises also test individual and collective skills and expertise of cyber specialists of organisations and companies.  Exercises provide the opportunity to involve all experts from technical fields up to the highest level decision making entities, even from remote locations.  One important internal goal of such exercises is to exchange critical cyber information and promote a collective defence approach in a rapid manner. Then coordinated response approaches may be developed and followed in due course for real life situations, to mitigate and eliminate virtual attacks to result in consequences that are real and potentially destructive.  Cyber exercises may be developed at various levels from table-top (mostly administrative) to fully developed and highly technical formats.

MULTI-LEVEL INFORMATION SECURITY AWARENESS PROGRAMS Multi-level (corporate-wide) information security awareness programs and campaigns for general users, system administrators, system developers, privileged users, internal trainers  Contact sessions  E-learning and campaigns through social media (apps)  Technical and social challenges  Gamification  ’Policy in Practice’  ’Train the Trainer’

(IT) SECURITY COURSES AND DEVELOPMENT  Cyber treat analysis  Log analysis and log management  Network forensics  Social engineering  Incident handling and management (incl. early warning, incident response, and incident mitigation)  IT project communication (strategic approach)  Cyber defence management

REPUTATION MANAGEMENT  Real-time influencer monitoring  Implementing communicational content search engine optimizing strategy for existing and future search terms on the client organisations and commercial entities  Real-time content creation  Real-time link shield building  Proactive actions before important initiatives of client organisations and commercial entities

KEY REFERENCES  Ethical Hacking Trainings for approx. 10 years (English, Hungarian) – duration varies b/w 2 weeks – 10 months  KÜRT Academy Ethical Hacking Course for 6 years  NATO Cyber Coalition Exercises – Core Strategic, Administrative, and Technical Planning (incl. Enterprise, Allies, Partners), 2012 – 2015  HUN MoD MilCIRC Capability Development, internal trainings for CTAC and forensics, 2015  UAE Dubai Smart Government GWISAP – Government Wide Information Security Awareness Program, program managers, content developers for ’Train the Trainer’ module, 2013 – 2014  HUN National Security Authority Cyber Defence Management Authority development, internal training of employees incl. CTAC, network forensics, log analysis, etc., 2011 – 2014  SME IT Security trainings for the HUN government IT service provider incl. information sec. awareness  EU Council SME IT Security Awareness course, course developers and trainers, 2012  ZAIN Kuwait – SME IT security awareness and IT professional courses, information security awareness campaigns 2010 – 2015  Global Conference on CyberSpace 2015 – Responsible Disclosure Initiative, founders (Global Forum on Cyber Expertise)

THANK YOU.