SlideShare a Scribd company logo
© 2014 MME BVBA, all rights reserved.
| IT Audits & SecurityMME
Company Presentation
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
About us
 MME BVBA, founded in 2010
 Specialized in security audits and training
 Objective approach, vendor independent
 Our focus is to advise and to educate
 We are not selling any products!
| ITAudits&SecurityMME
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Founder and CEO
 Over 15 years of experience as an IT professional
 Worked as a Systems Engineer, Developer, IT Manager
 Passion for Ethical Hacking and Penetration Testing
 Obsessed with Windows and web application (in)security
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Certifications
 GIAC GPEN
 EC-Council CEH
 MCSE Security, MCSA Security, MCITP, MCT
 CompTIA Security+, Network+, A+
 Vasco VCE/VCT
 Citrix CCA
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Honors
 Guest Professor HOWEST
‘Computer & Cyber Crime Professional’ (bachelor)
 Guest Speaker at conferences
ECSA, Infosecurity, SANS 2014, B-Sides Orlando, TDIS,...
 OWASP ZAP Evangelist / SANS Mentor Belgium
Zed Attack Proxy / Network Pentesting & Ethical Hacking
 Security Trainer
Belgacom JCA, Global Knowledge, Syntra, Escala,...
© 2014 MME BVBA, all rights reserved.
About us
 Malik Mesellem - Projects
 Vulnerability Researcher
CVE: 2013-4890, MS RDP Pass-the-Hash
 bWAPP - ‘a buggy web application’
Open source deliberately insecure web application. Helps security enthusiasts
and students to discover and to prevent web vulnerabilities (10.000+ downloads)
© 2014 MME BVBA, all rights reserved.
About us
 Diversity of security services
 Security Audits
 Security Training
 Security Software
 Malware Analysis
 Design & Configuration
 Server Hardening
 Source Code Review
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Security Audits
 We offer a wide range of security audits
 Vulnerability Assessment
 Network Penetration Testing
 Web Application Penetration Testing
 Active Directory and Password Audits
 Malware Analysis and Botnet Detection
 Wireless Security Surveys
 Configuration Reviews
 DoS and Stress Testing
© 2014 MME BVBA, all rights reserved.
Security Audits
 Every audit starts with a risk analysis
 Critical assets are defined
 Threats regarding these assets are analyzed
 Audit checkpoints are based on those threats
 A risk level is calculated for each checkpoint
© 2014 MME BVBA, all rights reserved.
 The risk level is determined using the following
calculation:
Risk Level = Impact x Probability
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
 Penetration testing identifies and exploits vulnerabilities
that may exist within the infrastructure
 Ethical hacking techniques are used
‘Like a hacker, but from an ethical point of view’
 Advantages +++
 Confirms potential vulnerabilities by excluding false positives
 Protects the network against intruders and malicious software
 Guarantees that your defense measures are working effectively
 Provides a higher availability, and maps the environment
© 2014 MME BVBA, all rights reserved.
Security Audits
 Web application penetration testing is focusing on
evaluating the security of a web application
 The application is tested for known vulnerabilities
 Automatic, semi-automatic as well as manual tests
 Different commercial ‘state-of-art’ vulnerability scanners
 To exclude false positives, all results are manually verified!
 Official OWASP methodology
 Based on the OWASP Top 10 Project (more)
© 2014 MME BVBA, all rights reserved.
Security Audits
 Some checkpoints in our web app penetration testing
 Injections (HTML, SQL, XML, LDAP,...)
 CSRF or Cross-Site Request Forgery
 XSS or Cross-Site Scripting
 Parameter Modification
 Security Misconfiguration
 Session Management
 Broken Authentication
 Sensitive Data Exposure
© 2014 MME BVBA, all rights reserved.
 Our Heartbeat Scan is a complete security audit
 All critical and vital parts are scanned and analyzed
 Potential threats and vulnerabilities are identified
 Spread over several days, for a fixed price
 Comprehensive checkpoints
 A risk level is calculated for each check
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
 Checkpoints in our Heartbeat Scan
 Vulnerability Assessment
 Internal and External Penetration Test
 Active Directory Review and Password Audit
 Software Updates Compliance Check
 Business Continuity - Disaster Recovery Check
 Firewall Configuration Review
 Wireless Security Survey
 Endpoint and Malware Check
© 2014 MME BVBA, all rights reserved.
Security Audits
 Optional checkpoints in the Hearbeat Scan
 Web Application Penetration Test
 Malware Analysis and Botnet Detection
 Social Engineering Test
 Source Code Analysis
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
© 2014 MME BVBA, all rights reserved.
Security Audits
 The report is a very important aspect
 Also made with an objective approach
 Understandable, not auto-generated!
 Comprehensive, it includes
 Management and technical part
 List of potential investments
 Detailed findings and advice
 Customized action plan
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Security Training
 Unique security courses, seminars, and workshops
 Ethical Hacking Basics (pdf)
 Ethical Hacking Advanced (pdf)
 Attacking & Defending Web Apps with bWAPP (pdf)
 Plant the Flags with bWAPP (pdf)
 What is bWAPP? (pdf)
 Windows Server 2012 Security (pdf)
 IT Security BOOTCAMP
© 2014 MME BVBA, all rights reserved.
Security Training
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
References
 We have realized successful projects with companies in
every sector of industry
 Colleges and training institutes
 Flemish and federal government
 Healthcare and retail sector
 ICT companies and telecom operators
 Investment and financial companies
 Non-profit organizations
 Stock listed companies
© 2014 MME BVBA, all rights reserved.
Company Presentation
 About us
 Security Audits
 Security Training
 Security Software
 References
 Contact us
© 2014 MME BVBA, all rights reserved.
Contact us
 MME BVBA - Malik Mesellem
Email | info@mmeit.be
LinkedIn | be.linkedin.com/in/malikmesellem
Twitter | twitter.com/MME_IT
Blog | itsecgames.blogspot.com
© 2014 MME BVBA, all rights reserved.
Contact us
 Follow MME on Twitter
 Receive info on the latest security news
 Take advantage of discounts on our courses
 Join our free online security challenges
 Stay updated on bWAPP
@MME_IT
#bWAPP #itsecgames

More Related Content

Similar to MME Company Presentation

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
Softwide Security
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
NovellaJohns
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
Narola Infotech
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
IBM Security
 
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptxIntroduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Sarah Arrow
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
Quick Heal Technologies Ltd.
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
CA API Management
 
International sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.LmtInternational sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.LmtA Tibetan Shepherd
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
Andrew Ames
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
IBM Security
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
Quentin Brown
 
Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)
Md Mofijul Haque
 
Infoprive Brochure
Infoprive Brochure Infoprive Brochure
Infoprive Brochure
Gbolabo Awelewa
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
SoftwareDeals
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life
SoftwareDeals
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
Distil Networks
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
SaeelRelekar
 

Similar to MME Company Presentation (20)

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptxIntroduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
Introduction to Cyber Essentials Protecting your digital assets powerpoint.pptx
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
International sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.LmtInternational sms - Solutions Infini Technologies Pvt.Lmt
International sms - Solutions Infini Technologies Pvt.Lmt
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)Industrial training Presentation (IUKL+DESHCYBER)
Industrial training Presentation (IUKL+DESHCYBER)
 
Infoprive Brochure
Infoprive Brochure Infoprive Brochure
Infoprive Brochure
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 

Recently uploaded

2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 

Recently uploaded (19)

2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 

MME Company Presentation

  • 1. © 2014 MME BVBA, all rights reserved. | IT Audits & SecurityMME Company Presentation
  • 2. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 3. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 4. © 2014 MME BVBA, all rights reserved. About us  MME BVBA, founded in 2010  Specialized in security audits and training  Objective approach, vendor independent  Our focus is to advise and to educate  We are not selling any products! | ITAudits&SecurityMME
  • 5. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Founder and CEO  Over 15 years of experience as an IT professional  Worked as a Systems Engineer, Developer, IT Manager  Passion for Ethical Hacking and Penetration Testing  Obsessed with Windows and web application (in)security
  • 6. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Certifications  GIAC GPEN  EC-Council CEH  MCSE Security, MCSA Security, MCITP, MCT  CompTIA Security+, Network+, A+  Vasco VCE/VCT  Citrix CCA
  • 7. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Honors  Guest Professor HOWEST ‘Computer & Cyber Crime Professional’ (bachelor)  Guest Speaker at conferences ECSA, Infosecurity, SANS 2014, B-Sides Orlando, TDIS,...  OWASP ZAP Evangelist / SANS Mentor Belgium Zed Attack Proxy / Network Pentesting & Ethical Hacking  Security Trainer Belgacom JCA, Global Knowledge, Syntra, Escala,...
  • 8. © 2014 MME BVBA, all rights reserved. About us  Malik Mesellem - Projects  Vulnerability Researcher CVE: 2013-4890, MS RDP Pass-the-Hash  bWAPP - ‘a buggy web application’ Open source deliberately insecure web application. Helps security enthusiasts and students to discover and to prevent web vulnerabilities (10.000+ downloads)
  • 9. © 2014 MME BVBA, all rights reserved. About us  Diversity of security services  Security Audits  Security Training  Security Software  Malware Analysis  Design & Configuration  Server Hardening  Source Code Review
  • 10. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 11. © 2014 MME BVBA, all rights reserved. Security Audits  We offer a wide range of security audits  Vulnerability Assessment  Network Penetration Testing  Web Application Penetration Testing  Active Directory and Password Audits  Malware Analysis and Botnet Detection  Wireless Security Surveys  Configuration Reviews  DoS and Stress Testing
  • 12. © 2014 MME BVBA, all rights reserved. Security Audits  Every audit starts with a risk analysis  Critical assets are defined  Threats regarding these assets are analyzed  Audit checkpoints are based on those threats  A risk level is calculated for each checkpoint
  • 13. © 2014 MME BVBA, all rights reserved.  The risk level is determined using the following calculation: Risk Level = Impact x Probability Security Audits
  • 14. © 2014 MME BVBA, all rights reserved. Security Audits  Penetration testing identifies and exploits vulnerabilities that may exist within the infrastructure  Ethical hacking techniques are used ‘Like a hacker, but from an ethical point of view’  Advantages +++  Confirms potential vulnerabilities by excluding false positives  Protects the network against intruders and malicious software  Guarantees that your defense measures are working effectively  Provides a higher availability, and maps the environment
  • 15. © 2014 MME BVBA, all rights reserved. Security Audits  Web application penetration testing is focusing on evaluating the security of a web application  The application is tested for known vulnerabilities  Automatic, semi-automatic as well as manual tests  Different commercial ‘state-of-art’ vulnerability scanners  To exclude false positives, all results are manually verified!  Official OWASP methodology  Based on the OWASP Top 10 Project (more)
  • 16. © 2014 MME BVBA, all rights reserved. Security Audits  Some checkpoints in our web app penetration testing  Injections (HTML, SQL, XML, LDAP,...)  CSRF or Cross-Site Request Forgery  XSS or Cross-Site Scripting  Parameter Modification  Security Misconfiguration  Session Management  Broken Authentication  Sensitive Data Exposure
  • 17. © 2014 MME BVBA, all rights reserved.  Our Heartbeat Scan is a complete security audit  All critical and vital parts are scanned and analyzed  Potential threats and vulnerabilities are identified  Spread over several days, for a fixed price  Comprehensive checkpoints  A risk level is calculated for each check Security Audits
  • 18. © 2014 MME BVBA, all rights reserved. Security Audits  Checkpoints in our Heartbeat Scan  Vulnerability Assessment  Internal and External Penetration Test  Active Directory Review and Password Audit  Software Updates Compliance Check  Business Continuity - Disaster Recovery Check  Firewall Configuration Review  Wireless Security Survey  Endpoint and Malware Check
  • 19. © 2014 MME BVBA, all rights reserved. Security Audits  Optional checkpoints in the Hearbeat Scan  Web Application Penetration Test  Malware Analysis and Botnet Detection  Social Engineering Test  Source Code Analysis
  • 20. © 2014 MME BVBA, all rights reserved. Security Audits
  • 21. © 2014 MME BVBA, all rights reserved. Security Audits
  • 22. © 2014 MME BVBA, all rights reserved. Security Audits
  • 23. © 2014 MME BVBA, all rights reserved. Security Audits
  • 24. © 2014 MME BVBA, all rights reserved. Security Audits  The report is a very important aspect  Also made with an objective approach  Understandable, not auto-generated!  Comprehensive, it includes  Management and technical part  List of potential investments  Detailed findings and advice  Customized action plan
  • 25. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 26. © 2014 MME BVBA, all rights reserved. Security Training  Unique security courses, seminars, and workshops  Ethical Hacking Basics (pdf)  Ethical Hacking Advanced (pdf)  Attacking & Defending Web Apps with bWAPP (pdf)  Plant the Flags with bWAPP (pdf)  What is bWAPP? (pdf)  Windows Server 2012 Security (pdf)  IT Security BOOTCAMP
  • 27. © 2014 MME BVBA, all rights reserved. Security Training
  • 28. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 29. © 2014 MME BVBA, all rights reserved. References  We have realized successful projects with companies in every sector of industry  Colleges and training institutes  Flemish and federal government  Healthcare and retail sector  ICT companies and telecom operators  Investment and financial companies  Non-profit organizations  Stock listed companies
  • 30. © 2014 MME BVBA, all rights reserved. Company Presentation  About us  Security Audits  Security Training  Security Software  References  Contact us
  • 31. © 2014 MME BVBA, all rights reserved. Contact us  MME BVBA - Malik Mesellem Email | info@mmeit.be LinkedIn | be.linkedin.com/in/malikmesellem Twitter | twitter.com/MME_IT Blog | itsecgames.blogspot.com
  • 32. © 2014 MME BVBA, all rights reserved. Contact us  Follow MME on Twitter  Receive info on the latest security news  Take advantage of discounts on our courses  Join our free online security challenges  Stay updated on bWAPP @MME_IT #bWAPP #itsecgames