SlideShare a Scribd company logo
1 of 16
Download to read offline
OMERTA INFORMATION SECURITY WWW.OMERTA.NL2
In a world unimaginable without internet,
where computers rule our everyday life a
brand-new industry has emerged nearly
unnoticedly: cyber crime. Enterprises,
organizations and institutions are so
vulnerable when being online that the
estimated loss for the Netherlands only varies
between two and ten billion Euros per year.
According to our knowledge, these estimations are probably not
even high enough – since frequently private information and
listed companies are involved it is not more than the tip of the
iceberg we know about. Omerta’s security experts, hackers and
programmers will protect and watch over your digital data. They
will make sure you can rely on your IT infrastructure,
communicate safely and have your financial and other sensitive
(customer) information secured behind bomb-proof walls.
About Us
Security, freedom and privacy are hard-earned features – and as
such you won’t let them just slip away. Everybody working for,
with and at Omerta truly believes in this. Omerta is continuously
innovating and developing. In a field of increasingly faster
superseding innovations with increasingly serious social and
socio-economic consequences we are concerned not to give up
our leading position in the creation and establishment of digital
security. We check crucial IT networks and vital systems for being
“ironclad”, identify leaks (and their source), secure systems
against hacker intrusion and watch them 24 hours a day.
Moreover, we help enterprises and respectively responsible
authorities gaining access to forensic research data in order to
actually identify active cyber criminals, prosecute and sentence
them. Being so close to the law and constant innovation, we, too,
improve every day to provide our clients with even better services
– certificates as per ISO 9001, series 27000, CISSP and CISA are of
course part of our vita.
Some of Omerta Information Security products are NL ( DV,
departmental trusted )EU Restricted and NATO Restricted.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL3
CONTENTS
PORTFOLIO
Omerta mobile
Apple
Omerta Cryptoguard
Omerta Firestorm
Omerta “Meds” mail Encrypted Defender System
Omerta semi conductor (diode)
Cyber Audit
Intelligence
Websecure
Cybersecurity as a service
Encrypt your cloud
Your own malware analyzer
Social Engineering Workshops and Training
4
5
6
7
8
9
10
11
12
13
14
15
16
OMERTA INFORMATION SECURITY WWW.OMERTA.NL4
OMERTA MOBILE
ANDROID/BLACKBERRY
The Omerta Mobile solution has been crafted with privacy
in mind. The Omerta Mobile solution will allow you to
perform secure phone calls and text messages via the
mobile. The Omerta Mobile solution is installed via a
secure microSD. The Omerta Mobile solution works on
Android and Blackberry phones.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL5
OMERTA MOBILE
APPLE
The Omerta PIM solution has been crafted for Apple
products. The Apple products will be able to perform
secure communication via the OMERTA PIM solution. The
OMERTA PIM solution can be downloaded but it is also
possible to apply a hardware OMERTA PIM solution which
will grant an extra security layer
OMERTA INFORMATION SECURITY WWW.OMERTA.NL6
OMERTA CRYPTOGUARD
VPN
The OMERTA cryptoguard solution has been crafted for
people that want to use secure communication channels.
The Cryptoguard solution will create a unique tunnel which
will allow the communication to pass through it. The
communication which is passed via the tunnel is
unreadable for third-parties.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL7
OMERTA FIRESTORM
VPN/NEXT GENERATION FIREALL
The OMERTA FIRESTORM solution is a next generation
solution. The Firestorm solution acts like a Firewall which
is capable of taking care of unlimited amount of users and
connections. The solution is used to secure the
communication channels of companies and government
environments.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL8
OMERTA “MEDS“
MAIL ENCRYPTED DEFENDER SYSTEM
The mail encrypted defender system (MEDS) will perform
encryption on all the e-mails which are send from within
the organization. The MEDS solution uses S/MIME,
OpenPGP, PDFMail and OmertaWebmail to perform secure
e-mail communication. This solution is often implemented
at companies which use and generate a lot of personal and
classified information.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL9
OMERTA SEMI-CONDUCTOR
DIODE
The SEMI-CONDUCTOR solution has been crafted to stop
(cyber) attacks from the outside. The Diode will create a one
way communication channel between the selected networks/
computers. This will disallow attackers to perform attacks on
the designated target as the target will only RECEIVE or SEND
information. The DIODE is often implemented at Industrial
environments as it is capable of handling temperatures of
-20 and +55 degrees.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL10
CYBER AUDIT
INVESTIGATION
The OMERTA cyber audit solution will provide an insight in
operation network/security levels within a company. Omerta
information security will use cyber security methodologies
and techniques to check the designated environment for
vulnerabilities, single points of failure and failed policies.
The scans and checks can be performed online and offline.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL11
INTELLIGENCE
BIG DATA COLLECTION
The Omerta Information Security “Intelligence” service will
provide the client the latest information about the possible
threats which might hit the client environment. It is
important for companies to keep track of the events which
are taken against or for a company. The Intelligence service
will allow companies to keep track of almost each post on
the internet which discusses the specified client requests
and keywords.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL12
WEBSECURE
SCHEDULED SCANNING
The Websecure service will provide a hourly/daily/weekly/
monthly scan on the designated website or server. The
service will provide insight on security and patch status of
the target. Masking, DDos prevention, malware scans,
stress testing and numerous other tests which will
prevent cyber-attacks or malfunctioning of your web
environment.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL13
CYBERSECURITY
AS A SERVICE
The cybersecurity as a service solution is a solution which
has been crafted for companies that want to outsource
their cyber security challenges. We from Omerta
Information Security will monitor the network and the
security status of the designated environment and we will
also perform actions to keep the environments secure.
This solution runs 24/7. A privileged SOC ( security
operations center ) is setup and fully operational at your
convenience.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL14
ENCRYPT YOUR CLOUD
THINK AGAIN
The cloud is awesome and it allows the users to gain
access to their files wherever they are. There is only one
problem, the files which are often uploaded to the cloud
are not secured (encrypted) and it is often unclear in
which country YOUR DATA is stored. Countries like the
United States are known for their privacy violation attacks
– to ensure our clients that they are secure against
governments and criminal organizations we have crafted
the “Encrypt your cloud” service.
The service will secure and encrypt all the files which
are uploaded to cloud environment. This will
disallow third-parties to read and access the content
which you have shared to the cloud.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL15
MALWARE ANALYZER
GET YOUR OWN
The Omerta Malware Analyzer will allow the client to scan
weird or malicious files for more information. The
information which is crafted by the malware analyzer will
allow the technical staff in the company to stop/block/
identify future attacks.
OMERTA INFORMATION SECURITY WWW.OMERTA.NL16
SOCIAL ENGINEERING
WORKSHOPS and TRAINING
Social Engineering is a skill used by hackers to gain
information such as credentials, personnel and systems,
about a company. As a company you can protect your
employes by learning them what dangers there are in
social engineering.
During the Social Engineering workshop the participants
are confronted with several videos and examples of
Social Engineering.
LEARNING GOALS
- Awareness of a social engineering attack
- Setup of a social engineering attack
- What to do if you are not sure if it is a Social
Engineering attack
Duration
The workshop takes around 3 hours. When additional
learning goals are requested, extra time will be
added.

More Related Content

What's hot

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001
trifuturein
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
Anita Lösch
 
PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
Marco Pissarello
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 
Login People Digital Dna 5mn Corporate June2011 En
Login People Digital Dna 5mn Corporate June2011 EnLogin People Digital Dna 5mn Corporate June2011 En
Login People Digital Dna 5mn Corporate June2011 En
FredericPaumier
 

What's hot (20)

6 Steps to SIP trunking security
6 Steps to SIP trunking security6 Steps to SIP trunking security
6 Steps to SIP trunking security
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
SecuSUITE® for Enterprise Data Sheet
SecuSUITE® for Enterprise Data SheetSecuSUITE® for Enterprise Data Sheet
SecuSUITE® for Enterprise Data Sheet
 
Akshaya Associates, Coimbatore, Security System
Akshaya Associates, Coimbatore, Security SystemAkshaya Associates, Coimbatore, Security System
Akshaya Associates, Coimbatore, Security System
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
How to get a secure digital communications with Spamina
How to get a secure digital communications with SpaminaHow to get a secure digital communications with Spamina
How to get a secure digital communications with Spamina
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]
 
PrivateWave - sales presentation_en
PrivateWave - sales presentation_enPrivateWave - sales presentation_en
PrivateWave - sales presentation_en
 
SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Corporate presentation spamina 2016
Corporate presentation   spamina 2016 Corporate presentation   spamina 2016
Corporate presentation spamina 2016
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Login People Digital Dna 5mn Corporate June2011 En
Login People Digital Dna 5mn Corporate June2011 EnLogin People Digital Dna 5mn Corporate June2011 En
Login People Digital Dna 5mn Corporate June2011 En
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Saif profile-Profile
Saif profile-ProfileSaif profile-Profile
Saif profile-Profile
 

Viewers also liked

Attest Aker Solution.PDF
Attest Aker Solution.PDFAttest Aker Solution.PDF
Attest Aker Solution.PDF
Kevin M Daghouz
 

Viewers also liked (12)

Pokolenie (F) Fragmentacja/ Generation (F) Fragmentation
Pokolenie (F) Fragmentacja/ Generation (F) FragmentationPokolenie (F) Fragmentacja/ Generation (F) Fragmentation
Pokolenie (F) Fragmentacja/ Generation (F) Fragmentation
 
my resume
my resumemy resume
my resume
 
Staria Digispots - Ketterä osaamisen johtaminen
Staria Digispots - Ketterä osaamisen johtaminenStaria Digispots - Ketterä osaamisen johtaminen
Staria Digispots - Ketterä osaamisen johtaminen
 
Word E-sports
Word E-sportsWord E-sports
Word E-sports
 
Attest Aker Solution.PDF
Attest Aker Solution.PDFAttest Aker Solution.PDF
Attest Aker Solution.PDF
 
Big Data and Cyber Security
Big Data and Cyber SecurityBig Data and Cyber Security
Big Data and Cyber Security
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 

Similar to Portfolio Omerta Information Security - Engels

Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 

Similar to Portfolio Omerta Information Security - Engels (20)

The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Top SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your BusinessTop SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your Business
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
What are the Various Functions of Firewall Solutions.pdf
What are the Various Functions of Firewall Solutions.pdfWhat are the Various Functions of Firewall Solutions.pdf
What are the Various Functions of Firewall Solutions.pdf
 

Portfolio Omerta Information Security - Engels

  • 1.
  • 2. OMERTA INFORMATION SECURITY WWW.OMERTA.NL2 In a world unimaginable without internet, where computers rule our everyday life a brand-new industry has emerged nearly unnoticedly: cyber crime. Enterprises, organizations and institutions are so vulnerable when being online that the estimated loss for the Netherlands only varies between two and ten billion Euros per year. According to our knowledge, these estimations are probably not even high enough – since frequently private information and listed companies are involved it is not more than the tip of the iceberg we know about. Omerta’s security experts, hackers and programmers will protect and watch over your digital data. They will make sure you can rely on your IT infrastructure, communicate safely and have your financial and other sensitive (customer) information secured behind bomb-proof walls. About Us Security, freedom and privacy are hard-earned features – and as such you won’t let them just slip away. Everybody working for, with and at Omerta truly believes in this. Omerta is continuously innovating and developing. In a field of increasingly faster superseding innovations with increasingly serious social and socio-economic consequences we are concerned not to give up our leading position in the creation and establishment of digital security. We check crucial IT networks and vital systems for being “ironclad”, identify leaks (and their source), secure systems against hacker intrusion and watch them 24 hours a day. Moreover, we help enterprises and respectively responsible authorities gaining access to forensic research data in order to actually identify active cyber criminals, prosecute and sentence them. Being so close to the law and constant innovation, we, too, improve every day to provide our clients with even better services – certificates as per ISO 9001, series 27000, CISSP and CISA are of course part of our vita. Some of Omerta Information Security products are NL ( DV, departmental trusted )EU Restricted and NATO Restricted.
  • 3. OMERTA INFORMATION SECURITY WWW.OMERTA.NL3 CONTENTS PORTFOLIO Omerta mobile Apple Omerta Cryptoguard Omerta Firestorm Omerta “Meds” mail Encrypted Defender System Omerta semi conductor (diode) Cyber Audit Intelligence Websecure Cybersecurity as a service Encrypt your cloud Your own malware analyzer Social Engineering Workshops and Training 4 5 6 7 8 9 10 11 12 13 14 15 16
  • 4. OMERTA INFORMATION SECURITY WWW.OMERTA.NL4 OMERTA MOBILE ANDROID/BLACKBERRY The Omerta Mobile solution has been crafted with privacy in mind. The Omerta Mobile solution will allow you to perform secure phone calls and text messages via the mobile. The Omerta Mobile solution is installed via a secure microSD. The Omerta Mobile solution works on Android and Blackberry phones.
  • 5. OMERTA INFORMATION SECURITY WWW.OMERTA.NL5 OMERTA MOBILE APPLE The Omerta PIM solution has been crafted for Apple products. The Apple products will be able to perform secure communication via the OMERTA PIM solution. The OMERTA PIM solution can be downloaded but it is also possible to apply a hardware OMERTA PIM solution which will grant an extra security layer
  • 6. OMERTA INFORMATION SECURITY WWW.OMERTA.NL6 OMERTA CRYPTOGUARD VPN The OMERTA cryptoguard solution has been crafted for people that want to use secure communication channels. The Cryptoguard solution will create a unique tunnel which will allow the communication to pass through it. The communication which is passed via the tunnel is unreadable for third-parties.
  • 7. OMERTA INFORMATION SECURITY WWW.OMERTA.NL7 OMERTA FIRESTORM VPN/NEXT GENERATION FIREALL The OMERTA FIRESTORM solution is a next generation solution. The Firestorm solution acts like a Firewall which is capable of taking care of unlimited amount of users and connections. The solution is used to secure the communication channels of companies and government environments.
  • 8. OMERTA INFORMATION SECURITY WWW.OMERTA.NL8 OMERTA “MEDS“ MAIL ENCRYPTED DEFENDER SYSTEM The mail encrypted defender system (MEDS) will perform encryption on all the e-mails which are send from within the organization. The MEDS solution uses S/MIME, OpenPGP, PDFMail and OmertaWebmail to perform secure e-mail communication. This solution is often implemented at companies which use and generate a lot of personal and classified information.
  • 9. OMERTA INFORMATION SECURITY WWW.OMERTA.NL9 OMERTA SEMI-CONDUCTOR DIODE The SEMI-CONDUCTOR solution has been crafted to stop (cyber) attacks from the outside. The Diode will create a one way communication channel between the selected networks/ computers. This will disallow attackers to perform attacks on the designated target as the target will only RECEIVE or SEND information. The DIODE is often implemented at Industrial environments as it is capable of handling temperatures of -20 and +55 degrees.
  • 10. OMERTA INFORMATION SECURITY WWW.OMERTA.NL10 CYBER AUDIT INVESTIGATION The OMERTA cyber audit solution will provide an insight in operation network/security levels within a company. Omerta information security will use cyber security methodologies and techniques to check the designated environment for vulnerabilities, single points of failure and failed policies. The scans and checks can be performed online and offline.
  • 11. OMERTA INFORMATION SECURITY WWW.OMERTA.NL11 INTELLIGENCE BIG DATA COLLECTION The Omerta Information Security “Intelligence” service will provide the client the latest information about the possible threats which might hit the client environment. It is important for companies to keep track of the events which are taken against or for a company. The Intelligence service will allow companies to keep track of almost each post on the internet which discusses the specified client requests and keywords.
  • 12. OMERTA INFORMATION SECURITY WWW.OMERTA.NL12 WEBSECURE SCHEDULED SCANNING The Websecure service will provide a hourly/daily/weekly/ monthly scan on the designated website or server. The service will provide insight on security and patch status of the target. Masking, DDos prevention, malware scans, stress testing and numerous other tests which will prevent cyber-attacks or malfunctioning of your web environment.
  • 13. OMERTA INFORMATION SECURITY WWW.OMERTA.NL13 CYBERSECURITY AS A SERVICE The cybersecurity as a service solution is a solution which has been crafted for companies that want to outsource their cyber security challenges. We from Omerta Information Security will monitor the network and the security status of the designated environment and we will also perform actions to keep the environments secure. This solution runs 24/7. A privileged SOC ( security operations center ) is setup and fully operational at your convenience.
  • 14. OMERTA INFORMATION SECURITY WWW.OMERTA.NL14 ENCRYPT YOUR CLOUD THINK AGAIN The cloud is awesome and it allows the users to gain access to their files wherever they are. There is only one problem, the files which are often uploaded to the cloud are not secured (encrypted) and it is often unclear in which country YOUR DATA is stored. Countries like the United States are known for their privacy violation attacks – to ensure our clients that they are secure against governments and criminal organizations we have crafted the “Encrypt your cloud” service. The service will secure and encrypt all the files which are uploaded to cloud environment. This will disallow third-parties to read and access the content which you have shared to the cloud.
  • 15. OMERTA INFORMATION SECURITY WWW.OMERTA.NL15 MALWARE ANALYZER GET YOUR OWN The Omerta Malware Analyzer will allow the client to scan weird or malicious files for more information. The information which is crafted by the malware analyzer will allow the technical staff in the company to stop/block/ identify future attacks.
  • 16. OMERTA INFORMATION SECURITY WWW.OMERTA.NL16 SOCIAL ENGINEERING WORKSHOPS and TRAINING Social Engineering is a skill used by hackers to gain information such as credentials, personnel and systems, about a company. As a company you can protect your employes by learning them what dangers there are in social engineering. During the Social Engineering workshop the participants are confronted with several videos and examples of Social Engineering. LEARNING GOALS - Awareness of a social engineering attack - Setup of a social engineering attack - What to do if you are not sure if it is a Social Engineering attack Duration The workshop takes around 3 hours. When additional learning goals are requested, extra time will be added.