Shtein Solutions offers to increase awareness of cyber threats for customer personnel. We will give a lecture with examples and explanation on how to prevent intrusions and what explanation on need to pay attention to.
In addition to training on general cybersecurity, we offer training for programmers and developers, where the emphasis is on secure application development and the correct architecture and security configuration. This training takes about 3-4 hours. it includes an open discussion where we can give up-to-date advice on application security.
Also, we offer a workshop covering a cyber incident on an internal network and check how quickly and correctly the relevant players react to suppressing the threat. This workshop may include one or more attack vectors that technical teams must respond to. Typically, this training is conducted with the permission of the information security manager without informing the technical departments so that for them it seems like a real incident. Only during the response process are they informed that this is an exercise, continuing to measure the response time and correctness of actions.
Cyber awareness training
Secure development training
Lecture "A hacker's view"
Cyber exercises (RED TEAM)
Our company provides the following services:
Primary technological and basic checks in the field of information security. Inspection of the network architecture, security systems, access rights. Construction of a risk map.
More DetailsThis test identifies existing vulnerabilities in the infrastructure in order to formulate recommendations for their elimination.
Testing using social engineering methods. The purpose of the test is to identify the staff’s level cyber security threat awareness.
Lectures and trainings on staff awareness of information security threats, as well as trainings on secure development for programmers.
Checking the security of the company according to the protocol. The purpose of the audit is to show in which areas of information security there are shortcomings and how to correct them.
More DetailsWhen a cyber incident occurs, it is important to understand exactly what happened and how, and to address the causes and gaps in the firm's information security.
More DetailsThe email attack simulation tests the effectiveness of email security tools such as email gateways, antiviruses, sandboxes and others.
More DetailsWe will identify weaknesses in mobile and web applications, in remote service systems and develop recommendations for eliminating detected vulnerabilities.
More DetailsWe will identify problems in protecting user computers for running malicious applications and monitoring the
system.
Since 2010, we have done a lot of work. This includes penetration tests and security audits, risk management, incident investigations, as well as consultations and solution design.