SECURING YOUR ASSETS / company_presentation_en_v1.00 / RG-C0

Similar documents
Cymsoft Information Technologies

Position Title: IT Security Specialist

Position Description IT Auditor

BHConsulting. Your trusted cybersecurity partner

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

locuz.com SOC Services

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Commonwealth Cyber Declaration

POSITION DESCRIPTION

BHConsulting. Your trusted cybersecurity partner

Security and Privacy Governance Program Guidelines

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Your Trusted Partner in Europe European Business Reliance Centre

1.What are critical infrastructures in Switzerland? CIP concept in Switzerland

Discussion on MS contribution to the WP2018

M a d. Take control of your digital security. Advisory & Audit Security Testing Certification Services Training & Awareness

Smart Data and its impact for Germany

Cyber, Information Security, and Data Protection

Sirius Security Overview

RUAG Cyber Security Understand Cyber. Protect Values.

Bradford J. Willke. 19 September 2007

Cloud Customer Architecture for Securing Workloads on Cloud Services

Certified Cyber Security Specialist

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

Helping you understand the impact of GDPR.

Sense of Security. Compliance, Protection and Business Confidence

Predstavenie štandardu ISO/IEC 27005

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

Mark Hofman SANS Institute/Shearwater Solutions

IT Information Security Manager Job Description

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

POSITION DESCRIPTION

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

DXC Security Training

standards and frameworks and controls oh my! Mike Garcia Senior Advisor for Elections Best Practices

Google Cloud & the General Data Protection Regulation (GDPR)

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

European Union Agency for Network and Information Security

John Snare Chair Standards Australia Committee IT/12/4

Digital Health Cyber Security Centre

Les joies et les peines de la transformation numérique

HCPC's Risk Assurance Part 1

MELANI: Information exchange a story of success

Provisional Translation

WHO-ITU National ehealth Strategy Toolkit

falanx Cyber ISO 27001: How and why your organisation should get certified

t a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e foresightconsulting.com.

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

2017 Company Profile

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

The UNISDR Private Sector Alliance for Disaster Resilient Societies

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Avanade s Approach to Client Data Protection

CONTINUOUS COMPLIANCE. Your next cloud compliance audit could be your last. With LayerV s Continuous Compliance Service you re covered

CYBER SECURITY TRAINING

Implementing an ISMS: Stories from the Trenches. Peter H. Gregory, CISA, CISSP, DRCE

CENTER FOR SECURITY STUDIES

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Data Sheet The PCI DSS

Towards a European Cloud Computing Strategy

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Hacker Academy UK. Black Suits, White Hats!

Global cybersecurity and international standards

FIJIAN ELECTIONS OFFICE SYSTEM CONSULTANCY AUDIT. Expression of Interest (EOI) (04/2017)

Never a dull moment. Media Conference «Clarity on Cyber Security» 24 May 2016

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Department of Management Services REQUEST FOR INFORMATION

Cesium Co. Ltd., Company Profile. Certification. Laboratory. Metrology Standards. When Performance Matters. Testing Quality

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

An Introduction to the SEforALL Building Efficiency Accelerator Belgrade BEA Kick-off Meeting 31 October 2016 Eric Mackres,

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

constag ag corporate presentation

ROLE DESCRIPTION IT SPECIALIST

Technical Information Assurance Team Structure. and Role Description

The Federal Council s Basic Strategy. for Critical Infrastructure Protection

Vulnerability Assessments and Penetration Testing

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

PAKISTAN HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES

EU General Data Protection Regulation (GDPR) Achieving compliance

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Ingram Micro Cyber Security Portfolio

Digital government toolkit

Critical Information Infrastructure Protection Law

CyberVista Certify cybervista.net

DIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM. Transport and ICT Global Practice World Bank

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

The Business of Security in the Cloud

BRING EXPERT TRAINING TO YOUR WORKPLACE.

A company built on security

Data Security Standard 9 IT protection The bigger picture and how the standard fits in

Transcription:

SECURING YOUR ASSETS 2018 / company_presentation_en_v1.00 / RG-C0

FACTS LOCATION OFFICE BERN Eigerstrasse 60 3007 Bern OFFICE ZURICH Hardturmstrasse 103 8005 Zürich ETABLISHMENT 2012 LEGAL FORM Stock company, complete in ownership of employees. NUMBER OF EMPLOYEES 21 (January 2018) 2

WHO WE ARE We are neutral and independent We consult and advise objectively and independently Our consulting principles Consultation comprises technical, organizational and human aspects Our central values are fairness, transparency, and sustainability Our activities are concentrated on the Swiss, German and Austrian markets We communicate clearly and understandably to all stakeholders Our advice applies to your specific business processes Our customer segment includes customers from all sectors and sizes 3

WHY REDGUARD THE FOLLOWING POINTS SPEAK IN FAVOR OF A COLLABORATION WITH US: Information Security represents our core business Tried and tested tools and methods Independence from manufacturers and products Over 300 successfully handled customer projects Wide and deep know-how building knowledge through research activities Many years of varied experience in different sectors Security-approved company employees with security clearance Strong network in the information security sector 4

COMPANY HISTORY Etablishment Redguard AG Opening Office Zürich We Strenghten Our Team: 10 Employees New Partner: Dominique Meier JUN 12 APR 14 FEB 16 MAY 12 JAN 13 DEC 14 MAR 16 Opening Office Bern 100 Projects Done Moving Office Bern 5

ORGANISATION ALEXANDER HERMANN Managing Partner ADMINISTRATION Office Manager RESEARCH OPERATIONS SALES SVEN VETSCH Head of Security Reserach DOMINIQUE MEIER Head of Operations KUNO BRODSCHOLL Head of Sales (Lead) Security Consultant (Lead) Security Tester 6

MANAGEMENT ALEXANDER HERMANN DOMINIQUE MEIER SVEN VETSCH KUNO BRODSCHOLL Managing Partner Partner & Head of Operations Partner & Head of Security Research Partner & Head of Sales 7

JOB PROFILE SECURITY CONSULTANT Main focus: Organization, Strategy and Education/Trainings SECURITY TESTER Main focus: Technology and Education/Trainings Degree in: Business informatics, Computer Science, Economy, History and Politics Degree in: Computer Science, Biomedical Engineering, IT Technology (MAS) Certification: CISSP, CISA, CISM, ISO 27001 Lead Auditor, OPSA, ITIL V3 Foundation, ISTBQ/SAQ, HERMES Certification: OSCE, OSCP, CISSP, OPST, OPSA, CSWT, CSWD, ITIL V3 Foundation 8

CLIENTS Finance Healthcare Industry Technology Public administration Public transportation Insurance Telecommunication Transport / Logistic 9

SALES DEVELOPMENT 2017 DEVELOPMENT OF SALES 2012-2017 CLIENTS 25% 75% 2012 2013 2014 2015 2016 2017 Sales New Customers Returning Customers 10

MEMBERSHIPS ISSS - Information Security Society Switzerland The Information Security Society Switzerland (ISSS) is the leading specialist association in Switzerland for ICT security, which today consists of more than 1100 security professionals and security interested people from the industry, governmental organizations and academia. Swiss Cyber Experts Swiss Cyber Experts has been founded in 2014 to support the federal government and the cantons in case of severe cyber incidents by providing analytical know-how. Swiss Cyber Experts and the Federal IT Steering Unit / MELANI concluded a cooperation agreement and thereby founded a public private partnership (PPP). 11

PRINCIPLES We interact with our partners on equal terms We continuously develop ourselves We act creatively and with foresight We work to ensure a stable future We teach and learn We act consciously and properly Our enthusiasm drives us Our communication is clear and transparent We exceed expectations Our team thrives on inspiration and mutual support 12

DIENSTLEISTUNGEN 13

OUR CORE FIELD OF EXPERTISE CONSULTING ACHIEVING GOALS means to choose the right path Information Security Management Systems (ISMS) based on ISO/IEC 2700x Security strategies, specifications and concepts Support for PCI-DSS Reviews Accompaniment and support for your procurement projects Support for projects and organizations as security consultants Secure development We support you in realizing projects efficiently and securely. 14

OUR CORE FIELD OF EXPERTISE AUDIT/TESTING LONG-LASTING BUSINESS SUCCESS requires a secure ICT infrastructure Penetration Testing Attack Simulation Audits Vulnerability Scans Risk analysis Social Engineering We help identifying, evaluating and mitigating security vulnerabilities and risks. 15

OUR CORE FIELD OF EXPERTISE TRAINING KNOWLEDGE requires education Trainings-Sample 1: Web Application Testing Trainings-Sample 2: Advanced Web Application Testing Trainings-Sample 3: OWASP Top 10 Trainings-Sample 4: Awareness Training Trainings-Sample 5: Secure Web Development Trainings-Sample 6: Metasploit Basics Our trainings builds long-lasting knowledge. 16

PROJECT MANAGEMENT Offer creation Work on Project and Project Management Debriefing Opportunity Management Project Preparation Project Realisation Project Completion Project Closing Kickoff Closing Meeting 17

SUCCESS STORIES EXIVO CYBER-ATTACK PATIENT DOSSIER Dormakaba had the new access solution exivo tested by the security experts at Redguard. Thereby the starting position was not without challenges: exivo is developed and operated in the cloud. To improve their security measures and get insights on their actual defense performance, KIBAG had Redguard performing an attack simulation on their corporate IT infrastructure. Digitalization is leading to farreaching changes in Swiss health care. New chances and possibilities also come with dangers and risks. Especially the areas of security and protection of patient data. Read more. Read more. Read more. 18

Thank you We would be glad to support you in securing your assets. Bern Zurich Redguard AG Eigerstrasse 60 CH-3007 Bern T +41 (0)31 511 37 50 www.redguard.ch Redguard AG Hardturmstrasse 103 CH-8005 Zürich T +41 (0)31 511 37 50 www.redguard.ch 19