Making the web a better and safer place.

Main Focus

Analysing your product and making
wireframes based on real data.
Crafting intuitive experience.

Crafting the experience is half of the battle. Making it visually appealing
is the other one.

Creating beautiful marketing videos
for the product using its visual
language as a base.

Cyber-Security is much more than a matter of IT.

My process...

IDENTIFY

Security Review & Risk Assessment

PROTECT

Security Awareness Training, Social Engineering, MFA, Firewall and Security and Compliance Management

DETECT

Real-time Network Security Monitoring & IT Infrastructure Vulnerability Monitoring and Alerting

RESPOND

IT Strategy & IT Helpdesk

RECOVER

Post-Security Breach Incident Response

"It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it."

Stephane Nappo

28stone-logo
client-nomads
logo-white_lv
client
upvisor
MY SERVICES

Doing technology
differently.

Security Compliance,
Application Security,
Managed Security, 
Security Consulting.
Compliance

 

Are you sure that your organization is fulfilling its requirements of information security? Do you know which steps to take to meet these external and internal security requirements?

I help my clients align their products and organizations with major security standards prior to expensive audits of certifying authorities. Advance preparation makes compliance certification easy, saving your money on extortionate rates of certifying auditors.

 

  • GDPR Compilance.
  • PCI DSS compliance.
  • HIPAA compliance.
  • SOC 2 compliance.
Incident Response

Incident response is an organized approach to rapidly responding to the aftermath of a security breach, incident, or cyberattack. I will help your team to reconnect networks, rebuild IT systems, restore corrupted or compromised data by, for instance, using clean sources. The process includes changing passwords on compromised accounts, installing new patches, adjusting firewalls settings etc. The goal of incident response is to quickly identify an attack, minimize its effects, contain the damage, and identify the incident's root cause to reduce the risk of future incidents.

Penetration Testing

The scope of security threats existing in the modern digitized world is unprecedented. Malicious actors are targeting companies’ systems to make huge money or cause reputational damage to victims.From the pen test performed by me, you get both the estimation of the level of your systems’ resistance to cyberattacks as well as the detailed step-by-step guide on how to strengthen your security.

  • Web Application Assessments.
  • Mobile Application Assessments.
  • External Penetration Tests
  • Internal Penetration Test.
  • Red Team Attack Simulation
Policy & Procedure Review

Effective Policies and Procedures are the key to any place of business. Outdated policies can put your organization at risk. Old policies may fail to comply with new laws and regulations. They may not address new systems or technology, which can result in inconsistent practices. Clear policies that are compliant with employment law allow business owners to sleep easier at night.

Risk Assessments

Information security risk assessment is an independent audit of the current state of the company's information system that determines the level of its compliance with specific security criteria.

A comprehensive security analysis allows you to get the most complete and objective evaluation of the security level of your information systems, isolate existing problems and develop an effective structure for building an organization's IS system.

Reduce your organization’s security risks and safeguard your data. I can offer to you and your team :

  • Identify Security Threats & Gaps
  • Assess security Risk
  • Deploy Effective Security Safeguards
Secure Coding

No matter how well trained, developers work under pressure to deliver quality products on time. Such focus often leads to technical security details being overlooked or sacrificed, accidentally or to meet deadlines. I will perform manual security code review and testing focused solely on identifying software weaknesses, which are essential to ensure the product’s robustness.

Security Awareness Training

Human error is the cause of up to 92% of cyber security breaches, and with simple awareness training this number can be dramatically reduced.My programs aimed at increasing the awareness of cyber threats as well as providing people with the relevant knowledge and skills to identify the attacked performed using the human factor.

  • Baiting.
  • Clean Desk Policy
  • Passwords and Authentication.
  • Phishing.
  • Physical security.
  • Pretexting.
  • Public Wi-Fi.
  • Security at Home
  • Social Engineering.
  • Spear phishing.
  • Watering Holes.
  • Working Remotely.
Vulnerability Scanning & Management

Vulnerability scans are performed by automated tools that identify known security bugs, unpatched operating systems, open ports, and configuration errors that can lead to security incidents. In the next phase, identified vulnerabilities are manually verified by me to eliminate false positives.

LET’S WORK TOGETHER

Request a
Consultation.

I will get back to you in no more
than 24 hours. Let’s get your project
rolling today!

 

Please, describe your idea briefly. You can share with me your desired timeframe and budget. 
ico-corner-orange-right