SlideShare a Scribd company logo
1 of 9
Portcullis Informational
          Presentation
     Eric Christenson – Director of Sales North America
Oliver Gruskovnjak – Director of Penetration Testing Services




                  Portcullis Security Inc.
                  www.portcullis-security.com
                   http://labs.portcullis.co.uk/
Portcullis Background
•Established in 1986, Security Testing Services launched in 1992

•Over 60 Staff members including 38 Experienced Consultants:
      – Quick response
      – Large detailed projects can be delivered in shorter timescales
      – Flexibility
      – No sub contractors, all full time employees

•3 International Locations
       – US Headquarters San Francisco, Ca
       – UK Headquarters & Forensics Laboratory, London, England
       – European Headquarters Madrid Spain.

•Our Client Base spans:
      – Retail and eCommerce (Supermarket, Online Trade, Clothing / Fashion etc).
      – Central & Local Government
      – Health Care, Financial Services
      – Technology and Gaming
      – Utilities and Transportation
      – Banking
      – Non-Profit/Charity
      – Defence Sector

•Accreditations and Experience
      – CREST (Founding Members)
      – FIRST Members
      – OWASP Members
      – PCI Accredited
      – CHECK (Founding Members)
Portcullis Strengths and Values
• IT security focused – not sector or industry specific
• Broad experience, across sectors and industries
• Manual penetration testing expertise and focus
• Tool development, R&D efforts ongoing
• Risk based approach
• Multilingual staff with international experience and presence
• 5000+ assessments in the last 5 years
Portcullis Security Services include…

              IT Security Testing (SPA)

                 Digital Forensics

                Incident Response

                     CTADS

               Secure Development

SRIE - RMDG
Security Posture Assessments

• SPA - External Infrastructure Assessment
   – Geographically unbound
• SPA - Internal Infrastructure Assessment
   –19 Locations
• SPA - Wireless Assessment
   –Combined with Internal Infrastructure
    Assessment, to save in travel expenses.
Security Testing and Auditing Services
 – External or Internal Infrastructure     – Build Reviews
   Assessment – i.e. Penetration Testing       > Desktop, Laptop, Server,
   and Vulnerability Testing                      Database etc
 – Web Application Assessment              – Router Assessment
 – Binary Application Assessment           – Firewall Assessment
 – Web Service Assessment                  – Switch Assessment
 – Code Review                             – External or Internal Host Assessment
 – PCI Security Testing                    – Data Exfiltration Assessment
 – Layer 2 Traffic Analysis                – Citrix Assessment
 – DOS Assessment                          – VPN Assessment
 – Social Engineering                      – Mobile Device Assessment
 – Information Disclosure Review           – VoIP Assessment
 – Wireless Assessment                     – BlackBerry Assessment
 – Wireless DoS Assessment                 – IOS Assessments (iPhone, iPad etc)
 – PCI DSS Services                        – Android Assessment
Consultancy, Training and Knowledge Transfer

Consultancy Services        Training and Knowledge
Includes:                   Transfer Includes:
  – Risk Assessment and       – Application Development
    Review                    – System Hardening
  – GAP Analysis of           – Security Testing
    Compliance                – Build Reviews
  – Management Summary        – Bespoke Training
    Reporting
  – Best Practise Reviews     – Presentations
     > Documentation /        – Test Observation
       Policy
     > Architecture
     > Topology
  – Research Projects
Reporting Formats
•Security Fault Notice Verbal /Email Report
•Summary Report
•Technical Report
•Email Support
•Management Summary
•Report Presentation / Conference Call
•Knowledge Transfer

More Related Content

Similar to Portcullis Us Public 2012 V 1

Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultantdcs HH
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 
Btas Capabilities Briefing
Btas Capabilities BriefingBtas Capabilities Briefing
Btas Capabilities Briefinglisamhl
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overviewtbeckwith
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013Nidhi Gupta
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013Nidhi Gupta
 
Think Future Technologies
Think Future TechnologiesThink Future Technologies
Think Future TechnologiesSwati Singh
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتeng_SamMoh
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Securitycarl yu
 

Similar to Portcullis Us Public 2012 V 1 (20)

Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultant
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Btas Capabilities Briefing
Btas Capabilities BriefingBtas Capabilities Briefing
Btas Capabilities Briefing
 
Jcv course contents
Jcv course contentsJcv course contents
Jcv course contents
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
It risk advisory brochure 2013
It risk advisory brochure 2013It risk advisory brochure 2013
It risk advisory brochure 2013
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Think Future Technologies
Think Future TechnologiesThink Future Technologies
Think Future Technologies
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 

Portcullis Us Public 2012 V 1

  • 1. Portcullis Informational Presentation Eric Christenson – Director of Sales North America Oliver Gruskovnjak – Director of Penetration Testing Services Portcullis Security Inc. www.portcullis-security.com http://labs.portcullis.co.uk/
  • 2. Portcullis Background •Established in 1986, Security Testing Services launched in 1992 •Over 60 Staff members including 38 Experienced Consultants: – Quick response – Large detailed projects can be delivered in shorter timescales – Flexibility – No sub contractors, all full time employees •3 International Locations – US Headquarters San Francisco, Ca – UK Headquarters & Forensics Laboratory, London, England – European Headquarters Madrid Spain. •Our Client Base spans: – Retail and eCommerce (Supermarket, Online Trade, Clothing / Fashion etc). – Central & Local Government – Health Care, Financial Services – Technology and Gaming – Utilities and Transportation – Banking – Non-Profit/Charity – Defence Sector •Accreditations and Experience – CREST (Founding Members) – FIRST Members – OWASP Members – PCI Accredited – CHECK (Founding Members)
  • 3. Portcullis Strengths and Values • IT security focused – not sector or industry specific • Broad experience, across sectors and industries • Manual penetration testing expertise and focus • Tool development, R&D efforts ongoing • Risk based approach • Multilingual staff with international experience and presence • 5000+ assessments in the last 5 years
  • 4. Portcullis Security Services include… IT Security Testing (SPA) Digital Forensics Incident Response CTADS Secure Development SRIE - RMDG
  • 5. Security Posture Assessments • SPA - External Infrastructure Assessment – Geographically unbound • SPA - Internal Infrastructure Assessment –19 Locations • SPA - Wireless Assessment –Combined with Internal Infrastructure Assessment, to save in travel expenses.
  • 6.
  • 7. Security Testing and Auditing Services – External or Internal Infrastructure – Build Reviews Assessment – i.e. Penetration Testing > Desktop, Laptop, Server, and Vulnerability Testing Database etc – Web Application Assessment – Router Assessment – Binary Application Assessment – Firewall Assessment – Web Service Assessment – Switch Assessment – Code Review – External or Internal Host Assessment – PCI Security Testing – Data Exfiltration Assessment – Layer 2 Traffic Analysis – Citrix Assessment – DOS Assessment – VPN Assessment – Social Engineering – Mobile Device Assessment – Information Disclosure Review – VoIP Assessment – Wireless Assessment – BlackBerry Assessment – Wireless DoS Assessment – IOS Assessments (iPhone, iPad etc) – PCI DSS Services – Android Assessment
  • 8. Consultancy, Training and Knowledge Transfer Consultancy Services Training and Knowledge Includes: Transfer Includes: – Risk Assessment and – Application Development Review – System Hardening – GAP Analysis of – Security Testing Compliance – Build Reviews – Management Summary – Bespoke Training Reporting – Best Practise Reviews – Presentations > Documentation / – Test Observation Policy > Architecture > Topology – Research Projects
  • 9. Reporting Formats •Security Fault Notice Verbal /Email Report •Summary Report •Technical Report •Email Support •Management Summary •Report Presentation / Conference Call •Knowledge Transfer

Editor's Notes

  1. Our services look to articulate the real/actual risk to the systems being assessed rather than theoretical or hypothetical ones that VA provides. Risk Approach: Risk in regards to scope try to understand the main points an attacker would take, where’s the data stored. Risk based approach during testing, we start with a low risk assessment build step by step until we reach a possible compromise
  2. This in an iterative approach as we discover issues and exploit them we can continue to escalate our efforts to compromise as far as the agreed scope will allow.