CASE STUDY
Some highlights of work we've done for our clients
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Cyber infrastructure and integration systems audit
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
IT processes audit
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
AWS infrastructure security audit
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Azure tenant security
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Security audit in the Bank
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
AWS disaster recover planning
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
GCP project security
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Incident response
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Internal network penetration testing
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
ISO27001 telecom operator compliance gap analysis
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Log management system operation and security event monitoring
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Mobile application security audit
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
OWASP ASVS certification
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
PCI-DSS internal pentest
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
PHP application source code audit
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
REST API penetration testing
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
COBIT training course
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
IT Audit training course
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
ICO smart contract security audit
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
SCADA Security Foundations Theory training course
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
Fraud prevention in IT systems training course
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
Secure software development for Android and iOS technology stacks training course
![](https://d33wubrfki0l68.cloudfront.net/acad416b6f9b1fd021cc35825d42eaca33198473/b4e36/static/rectangle-214-2--66d52473602356f5f14a8ce1f2afc7df.png)
Internal Auditor training course
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
Windows/Mac program security audit
![](https://d33wubrfki0l68.cloudfront.net/057e237edebaf00527c2dc7c866173dfcb3964a5/74c76/static/rectangle-213-2--e6dc6fd5632d696dd8be2525cc73e3b9.png)
WordPress website penetration testing