Cydeckt core values
Integrity, Trust, Long Term Thinking, Collaboration, Innovation
These things never change
Integrity: Doing what's right, even when no one is looking. We are building a business based on ethics.
Trust: Our reputation is our most important asset. It takes years to build and can be lost in a few minutes.
Long term thinking: Developing long term strategic partnerships with customers and technology partners.
Collaboration: Establishing a culture of teamwork and diversity of thinking.
Innovation: Continuing to change, improve, and capitalize on new security technologies.
Expertise & Innovation
Our Managing Director, Joseph Beerman, is a former Senior Business Development Manager for the Cyber Security business of Raytheon, a $24 Billion company selected to provide cybersecurity for over 100 federal civilian government agencies in the United States to help protect their networks against malicious hackers. He previously had a twenty-three-year career working at Embassies of the United States in Central Europe. He began his career on Wall Street as an investment advisor for Merrill Lynch & Co. Joseph earned a Bachelor of Arts Degree in Economics and Government from St. Lawrence University.
Our Technical Consultant, Mario Pirker, has more than nine years of experience working for various clients in Europe and United States. He is a senior level Security Specialist with expertise in Vulnerability Research, Reverse Engineering, Penetration Testing, and Software Development. He has advised companies from 100 to 10,000 employees regarding a wide range of cybersecurity topics. He has multiple cyber security certifications, including the Certified Information Systems Security Professional (CISSP) and the Certified Ethical Hacker (CEH). Mario earned a Bachelor of Science degree in Computer Science from the University of Innsbruck, a Masters of Science degree in Software and System Security from the University of Oxford, and a Masters of Science degree in Computer Science from the University of Hagen.
Data Protection Specialist
Our Data Protection Specialist, Joachim Ritz, has over six years of experience in IT Security Consulting supporting large European enterprises in the conceptual and implementation phases of projects for the protection of critical data. He is an expert in Data Classification, Data Loss Prevention, Data Encryption, Data Rights Management, Data Governance, and Data Life Cycle Analysis. He also has experience as an IT Security Consultant in PKI, Mobile Security, and Endpoint Security implementations. Joachim earned a Bachelor of Science degree in business informatics from EDS Operations Services GmbH, which later became HP Enterprise Services.
Our Technical Consultant, Krzysztof Hudek, has more than seven years of experience working for international clients around the world. He holds multiple certifications, including Certified Information Systems Security Professional (CISSP) and Certified Informations Systems Auditor (CISA). He is an expert in Security Information and Event Management (SIEM) solutions, incident investigations and response, log and forensic analysis, Security Operations Center (SOC) build out and design, as well as monitoring use cases design and implementations. He previously worked for Hewlett Packard Enterprises, UBS Bank, and ING Bank. Krzysztof earned a Bachelor of Science degree in Electronics and Information Technology from the Warsaw University of Technology, and a Masters of Science Degree in IT Security and Computer Forensics from the Silesian University of Technology.
Andriu Isenring Ritsch
Our Technical Consultant, Andriu Isenring Ritsch, has over 20 years of experience working as a IT Security Specialist for large international companies in Europe (Finance, Healthcare, Government, IT, Manufacturing, E-Commerce) . He is an expert in penetration testing, ethical hacking, network security, audits, and security consulting. He is a Certified Information Systems Security Professional (CISSP). Andriu studied Information Technology at the University of Hagen. He is a member of ISC2, ISACA and on the OSSTMM Gold Team.
Our Technical Consultant, Thomas Frank, has ten years of experience working as an IT Security Consultant and Specialist in Vulnerability Management & Infrastructure Security for large international companies (Telecommunication, ICT, Finance, Government). He holds multiple certifications, including Certified Information Systems Security Professional (CISSP) and Offensive Security Certified Professional (OSCP). He is an expert in Penetration Testing and Vulnerability Assessments, Network Security, Web Application and Mobile Application Security. He previously worked for T-Systems International, Deutsche Bank and UBS Bank. Thomas studied Information Technology at the University of Applied Sciences Regensburg and EVTEK University of Applied Science Espoo/Helsinki Finland.
Our Strategic Advisor, Cameron Pforr, has over twenty years experience working with many of the leading technology companies in the United States and Europe. He is the former President and Chief Financial Officer of Whiptail, one of the original flash storage companies which was purchased by Cisco in 2013. At his last firm he formed partnerships with the leading storage companies including EMC, IBM, Network Appliance and Hitachi Data Systems. He formerly was an investment banker with Deutsche Bank where he raised $14 Billion in capital and managed acquisitions for technology companies. He began his career at Bain Consulting. Cameron has a Bachelor of Science in Computer Science and also holds a Masters in Business Administration from the Wharton School of Management, University of Pennsylvania.
Three Easy Steps
To Reduce Risk
- Understand Problem
- Proposal & Quote
- Assessment & Report
1. Understand Problem
We first listen to your concerns, problems. We gain an understanding of your business processes. We're interested in hearing about your mission-critical applications and data, and which controls you already have in place.
2. Proposal & Quote
After gathering enough information, we send you a written proposal on how we would go about conducting a Data Risk Assessment, Vulnerability Assessment, Penetration Test, or Incident Investigation of your network. We document the scope of the assessment or investigation (systems to be assessed or investigated, duration of assessment or investigation, etc.). We give you a price quote.
3. Assessment & Report
If our offer is accepted, we conduct the assessment or investigation of your network. We'd provide you with a detailed report of our findings, and also provide recommendations on how best to reduce or mitigate risks. Where appropriate, we'd offer policy, training and technology products and solutions recommendations.