SlideShare ist ein Scribd-Unternehmen logo
1 von 32
© 2014 MME BVBA, all rights reserved.
| IT Audits & SecurityMME
Company Presentation
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
About us
 MME BVBA, founded in 2010
 Specialized in security audits and training
 Objective approach, vendor independent
 Our focus is to advise and to educate
 We are not selling any products!
| ITAudits&SecurityMME
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Founder and CEO
 Over 15 years of experience as an IT professional
 Worked as a Systems Engineer, Developer, IT Manager
 Passion for Ethical Hacking and Penetration Testing
 Obsessed with Windows and web application (in)security
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Certifications
 GIAC GPEN
 EC-Council CEH
 MCSE Security, MCSA Security, MCITP, MCT
 CompTIA Security+, Network+, A+
 Vasco VCE/VCT
 Citrix CCA
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Honors
 Guest Professor HOWEST
‘Computer & Cyber Crime Professional’ (bachelor)
 Guest Speaker at conferences
ECSA, Infosecurity, SANS 2014, B-Sides Orlando, TDIS,...
 OWASP ZAP Evangelist / SANS Mentor Belgium
Zed Attack Proxy / Network Pentesting & Ethical Hacking
 Security Trainer
Belgacom JCA, Global Knowledge, Syntra, Escala,...
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Projects
 Vulnerability Researcher
CVE: 2013-4890, MS RDP Pass-the-Hash
 bWAPP - ‘a buggy web application’
Open source deliberately insecure web application. Helps security enthusiasts
and students to discover and to prevent web vulnerabilities (10.000+ downloads)
© 2014 MME BVBA, all rights reserved.
About us
 Diversity of security services
 Security Audits
 Security Training
 Security Software
 Malware Analysis
 Design & Configuration
 Server Hardening
 Source Code Review
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Security Audits
 We offer a wide range of security audits
 Vulnerability Assessment
 Network Penetration Testing
 Web Application Penetration Testing
 Active Directory and Password Audits
 Malware Analysis and Botnet Detection
 Wireless Security Surveys
 Configuration Reviews
 DoS and Stress Testing
© 2014 MME BVBA, all rights reserved.
Security Audits
 Every audit starts with a risk analysis
 Critical assets are defined
 Threats regarding these assets are analyzed
 Audit checkpoints are based on those threats
 A risk level is calculated for each checkpoint
© 2014 MME BVBA, all rights reserved.
 The risk level is determined using the following
calculation:
Risk Level = Impact x Probability
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
 Penetration testing identifies and exploits vulnerabilities
that may exist within the infrastructure
 Ethical hacking techniques are used
‘Like a hacker, but from an ethical point of view’
 Advantages +++
 Confirms potential vulnerabilities by excluding false positives
 Protects the network against intruders and malicious software
 Guarantees that your defense measures are working effectively
 Provides a higher availability, and maps the environment
© 2014 MME BVBA, all rights reserved.
Security Audits
 Web application penetration testing is focusing on
evaluating the security of a web application
 The application is tested for known vulnerabilities
 Automatic, semi-automatic as well as manual tests
 Different commercial ‘state-of-art’ vulnerability scanners
 To exclude false positives, all results are manually verified!
 Official OWASP methodology
 Based on the OWASP Top 10 Project (more)
© 2014 MME BVBA, all rights reserved.
Security Audits
 Some checkpoints in our web app penetration testing
 Injections (HTML, SQL, XML, LDAP,...)
 CSRF or Cross-Site Request Forgery
 XSS or Cross-Site Scripting
 Parameter Modification
 Security Misconfiguration
 Session Management
 Broken Authentication
 Sensitive Data Exposure
© 2014 MME BVBA, all rights reserved.
 Our Heartbeat Scan is a complete security audit
 All critical and vital parts are scanned and analyzed
 Potential threats and vulnerabilities are identified
 Spread over several days, for a fixed price
 Comprehensive checkpoints
 A risk level is calculated for each check
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
 Checkpoints in our Heartbeat Scan
 Vulnerability Assessment
 Internal and External Penetration Test
 Active Directory Review and Password Audit
 Software Updates Compliance Check
 Business Continuity - Disaster Recovery Check
 Firewall Configuration Review
 Wireless Security Survey
 Endpoint and Malware Check
© 2014 MME BVBA, all rights reserved.
Security Audits
 Optional checkpoints in the Hearbeat Scan
 Web Application Penetration Test
 Malware Analysis and Botnet Detection
 Social Engineering Test
 Source Code Analysis
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
 The report is a very important aspect
 Also made with an objective approach
 Understandable, not auto-generated!
 Comprehensive, it includes
 Management and technical part
 List of potential investments
 Detailed findings and advice
 Customized action plan
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Security Training
 Unique security courses, seminars, and workshops
 Ethical Hacking Basics (pdf)
 Ethical Hacking Advanced (pdf)
 Attacking & Defending Web Apps with bWAPP (pdf)
 Plant the Flags with bWAPP (pdf)
 What is bWAPP? (pdf)
 Windows Server 2012 Security (pdf)
 IT Security BOOTCAMP
© 2014 MME BVBA, all rights reserved.
Security Training
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
References
 We have realized successful projects with companies in
every sector of industry
 Colleges and training institutes
 Flemish and federal government
 Healthcare and retail sector
 ICT companies and telecom operators
 Investment and financial companies
 Non-profit organizations
 Stock listed companies
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Contact us
 MME BVBA - Malik Mesellem
Email | info@mmeit.be
LinkedIn | be.linkedin.com/in/malikmesellem
Twitter | twitter.com/MME_IT
Blog | itsecgames.blogspot.com
© 2014 MME BVBA, all rights reserved.
Contact us
 Follow MME on Twitter
 Receive info on the latest security news
 Take advantage of discounts on our courses
 Join our free online security challenges
 Stay updated on bWAPP
@MME_IT
#bWAPP #itsecgames

Weitere ähnliche Inhalte

Ähnlich wie MME Company Presentation

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?NovellaJohns
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowNarola Infotech
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptxIntroduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptxSarah Arrow
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityQuick Heal Technologies Ltd.
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
International sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.LmtInternational sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.LmtA Tibetan Shepherd
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)Md Mofijul Haque
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?SoftwareDeals
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital LifeSoftwareDeals
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPTSaeelRelekar
 

Ähnlich wie MME Company Presentation (20)

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptxIntroduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
International sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.LmtInternational sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.Lmt
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)
 
Infoprive Brochure
Infoprive Brochure Infoprive Brochure
Infoprive Brochure
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 

Kürzlich hochgeladen

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedDelhi Call girls
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Pooja Nehwal
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Delhi Call girls
 

Kürzlich hochgeladen (18)

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 

MME Company Presentation

  • 1. © 2014 MME BVBA, all rights reserved. | IT Audits & SecurityMME Company Presentation
  • 2. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 3. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 4. © 2014 MME BVBA, all rights reserved. About us  MME BVBA, founded in 2010  Specialized in security audits and training  Objective approach, vendor independent  Our focus is to advise and to educate  We are not selling any products! | ITAudits&SecurityMME
  • 5. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Founder and CEO  Over 15 years of experience as an IT professional  Worked as a Systems Engineer, Developer, IT Manager  Passion for Ethical Hacking and Penetration Testing  Obsessed with Windows and web application (in)security
  • 6. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Certifications  GIAC GPEN  EC-Council CEH  MCSE Security, MCSA Security, MCITP, MCT  CompTIA Security+, Network+, A+  Vasco VCE/VCT  Citrix CCA
  • 7. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Honors  Guest Professor HOWEST ‘Computer & Cyber Crime Professional’ (bachelor)  Guest Speaker at conferences ECSA, Infosecurity, SANS 2014, B-Sides Orlando, TDIS,...  OWASP ZAP Evangelist / SANS Mentor Belgium Zed Attack Proxy / Network Pentesting & Ethical Hacking  Security Trainer Belgacom JCA, Global Knowledge, Syntra, Escala,...
  • 8. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Projects  Vulnerability Researcher CVE: 2013-4890, MS RDP Pass-the-Hash  bWAPP - ‘a buggy web application’ Open source deliberately insecure web application. Helps security enthusiasts and students to discover and to prevent web vulnerabilities (10.000+ downloads)
  • 9. © 2014 MME BVBA, all rights reserved. About us  Diversity of security services  Security Audits  Security Training  Security Software  Malware Analysis  Design & Configuration  Server Hardening  Source Code Review
  • 10. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 11. © 2014 MME BVBA, all rights reserved. Security Audits  We offer a wide range of security audits  Vulnerability Assessment  Network Penetration Testing  Web Application Penetration Testing  Active Directory and Password Audits  Malware Analysis and Botnet Detection  Wireless Security Surveys  Configuration Reviews  DoS and Stress Testing
  • 12. © 2014 MME BVBA, all rights reserved. Security Audits  Every audit starts with a risk analysis  Critical assets are defined  Threats regarding these assets are analyzed  Audit checkpoints are based on those threats  A risk level is calculated for each checkpoint
  • 13. © 2014 MME BVBA, all rights reserved.  The risk level is determined using the following calculation: Risk Level = Impact x Probability Security Audits
  • 14. © 2014 MME BVBA, all rights reserved. Security Audits  Penetration testing identifies and exploits vulnerabilities that may exist within the infrastructure  Ethical hacking techniques are used ‘Like a hacker, but from an ethical point of view’  Advantages +++  Confirms potential vulnerabilities by excluding false positives  Protects the network against intruders and malicious software  Guarantees that your defense measures are working effectively  Provides a higher availability, and maps the environment
  • 15. © 2014 MME BVBA, all rights reserved. Security Audits  Web application penetration testing is focusing on evaluating the security of a web application  The application is tested for known vulnerabilities  Automatic, semi-automatic as well as manual tests  Different commercial ‘state-of-art’ vulnerability scanners  To exclude false positives, all results are manually verified!  Official OWASP methodology  Based on the OWASP Top 10 Project (more)
  • 16. © 2014 MME BVBA, all rights reserved. Security Audits  Some checkpoints in our web app penetration testing  Injections (HTML, SQL, XML, LDAP,...)  CSRF or Cross-Site Request Forgery  XSS or Cross-Site Scripting  Parameter Modification  Security Misconfiguration  Session Management  Broken Authentication  Sensitive Data Exposure
  • 17. © 2014 MME BVBA, all rights reserved.  Our Heartbeat Scan is a complete security audit  All critical and vital parts are scanned and analyzed  Potential threats and vulnerabilities are identified  Spread over several days, for a fixed price  Comprehensive checkpoints  A risk level is calculated for each check Security Audits
  • 18. © 2014 MME BVBA, all rights reserved. Security Audits  Checkpoints in our Heartbeat Scan  Vulnerability Assessment  Internal and External Penetration Test  Active Directory Review and Password Audit  Software Updates Compliance Check  Business Continuity - Disaster Recovery Check  Firewall Configuration Review  Wireless Security Survey  Endpoint and Malware Check
  • 19. © 2014 MME BVBA, all rights reserved. Security Audits  Optional checkpoints in the Hearbeat Scan  Web Application Penetration Test  Malware Analysis and Botnet Detection  Social Engineering Test  Source Code Analysis
  • 20. © 2014 MME BVBA, all rights reserved. Security Audits
  • 21. © 2014 MME BVBA, all rights reserved. Security Audits
  • 22. © 2014 MME BVBA, all rights reserved. Security Audits
  • 23. © 2014 MME BVBA, all rights reserved. Security Audits
  • 24. © 2014 MME BVBA, all rights reserved. Security Audits  The report is a very important aspect  Also made with an objective approach  Understandable, not auto-generated!  Comprehensive, it includes  Management and technical part  List of potential investments  Detailed findings and advice  Customized action plan
  • 25. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 26. © 2014 MME BVBA, all rights reserved. Security Training  Unique security courses, seminars, and workshops  Ethical Hacking Basics (pdf)  Ethical Hacking Advanced (pdf)  Attacking & Defending Web Apps with bWAPP (pdf)  Plant the Flags with bWAPP (pdf)  What is bWAPP? (pdf)  Windows Server 2012 Security (pdf)  IT Security BOOTCAMP
  • 27. © 2014 MME BVBA, all rights reserved. Security Training
  • 28. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 29. © 2014 MME BVBA, all rights reserved. References  We have realized successful projects with companies in every sector of industry  Colleges and training institutes  Flemish and federal government  Healthcare and retail sector  ICT companies and telecom operators  Investment and financial companies  Non-profit organizations  Stock listed companies
  • 30. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 31. © 2014 MME BVBA, all rights reserved. Contact us  MME BVBA - Malik Mesellem Email | info@mmeit.be LinkedIn | be.linkedin.com/in/malikmesellem Twitter | twitter.com/MME_IT Blog | itsecgames.blogspot.com
  • 32. © 2014 MME BVBA, all rights reserved. Contact us  Follow MME on Twitter  Receive info on the latest security news  Take advantage of discounts on our courses  Join our free online security challenges  Stay updated on bWAPP @MME_IT #bWAPP #itsecgames