Cydeckt core values
Integrity, Trust, Long Term Thinking, Collaboration, Innovation
These things never change
Integrity: Doing what's right, even when no one is looking. We are building a business based on ethics.
Trust: Our reputation is our most important asset. It takes years to build and can be lost in a few minutes.
Long term thinking: Developing long term strategic partnerships with customers and technology partners.
Collaboration: Establishing a culture of teamwork and diversity of thinking.
Innovation: Continuing to change, improve, and capitalize on new security technologies.
Expertise & Innovation
Our Managing Director, Joseph Beerman, is a former Senior Business Development Manager for the Cyber Security business of Raytheon, a $26 Billion company selected to provide cybersecurity for over 100 federal civilian government agencies in the United States to help protect their networks against malicious hackers. He previously had a twenty-three-year career working at Embassies of the United States in Central Europe. He is an AWS Certified SysOps Administrator and holds a Security+ certification. Joseph earned a Bachelor of Arts Degree in Economics and Government from St. Lawrence University.
Data Protection Specialist
Our Data Protection Specialist, Joachim Ritz, has over six years of experience in IT Security Consulting supporting large European enterprises in the conceptual and implementation phases of projects for the protection of critical data. He is an expert in Data Classification, Data Loss Prevention, Data Encryption, Data Rights Management, Data Governance, and Data Life Cycle Analysis. He also has experience as an IT Security Consultant in PKI, Mobile Security, and Endpoint Security implementations. Joachim earned a Bachelor of Science degree in business informatics from EDS Operations Services GmbH, which later became HP Enterprise Services.
Our Technical Consultant, Krzysztof Hudek, has more than seven years of experience working for international clients around the world. He holds multiple certifications, including Certified Information Systems Security Professional (CISSP) and Certified Informations Systems Auditor (CISA). He is an expert in Security Information and Event Management (SIEM) solutions, incident investigations and response, log and forensic analysis, Security Operations Center (SOC) build out and design, as well as monitoring use cases design and implementations. He previously worked for Hewlett Packard Enterprises, UBS Bank, and ING Bank. Krzysztof earned a Bachelor of Science degree in Electronics and Information Technology from the Warsaw University of Technology, and a Masters of Science Degree in IT Security and Computer Forensics from the Silesian University of Technology.
Andriu Isenring Ritsch
Our Technical Consultant, Andriu Isenring Ritsch, has over 20 years of experience working as a IT Security Specialist for large international companies in Europe (Finance, Healthcare, Government, IT, Manufacturing, E-Commerce) . He is an expert in penetration testing, ethical hacking, network security, audits, and security consulting. He is a Certified Information Systems Security Professional (CISSP). Andriu studied Information Technology at the University of Hagen. He is a member of ISC2, ISACA and on the OSSTMM Gold Team.
Our Strategic Advisor, Cameron Pforr, has over twenty years experience working with many of the leading technology companies in the United States and Europe. He is the former President and Chief Financial Officer of Whiptail, one of the original flash storage companies which was purchased by Cisco in 2013. At his last firm he formed partnerships with the leading storage companies including EMC, IBM, Network Appliance and Hitachi Data Systems. He formerly was an investment banker with Deutsche Bank where he raised $14 Billion in capital and managed acquisitions for technology companies. He began his career at Bain Consulting. Cameron has a Bachelor of Science in Computer Science and also holds a Masters in Business Administration from the Wharton School of Management, University of Pennsylvania.
Three Easy Steps
To Reduce Risk
- Understand Problem
- Proposal & Quote
- Assessment & Report
1. Understand Problem
We first listen to your concerns, problems. We gain an understanding of your business processes. We're interested in hearing about your mission-critical applications and data, and which controls you already have in place.
2. Proposal & Quote
After gathering enough information, we send you a written proposal on how we would go about conducting a Penetration Test, or Forensic analysis of your network. We document the scope of the assessment or investigation (systems to be assessed or investigated, duration of assessment or investigation, etc.). We give you a price quote.
3. Assessment & Report
If our offer is accepted, we conduct the assessment or investigation of your network. We'd provide you with a detailed report of our findings, and also provide recommendations on how best to reduce or mitigate risks. Where appropriate, we'd offer policy, training and technology products and solutions recommendations.