SlideShare a Scribd company logo
1 of 23
Cyber 51
Company Presentation

                           Presented by
                            Martin Voelk
                       Co-Founder & Director
Agenda


                    Our
 About us                       Values
               Accreditations


Partnerships      Clients       Services


 Technical                      Support
                  Projects
Capabilities                    options
About Us

Martin Voelk
Co-Founder and CEO at Cyber 51

•   Bachelors Degree in Computer Science
•   Cisco CCIE # 13708
•   Cisco CCSP & Cisco CCNP Security
•   4011, 4013 NSA InfoSec
•   Certified Ethical Hacker (C|EH)
•   15 years of IT & Security Experience
•   Launched numerous successful Start-Ups
About Us

Diego Spahn
Co-Founder and Technical Director at Cyber 51

•   Certified Ethical Hacker – C|EH™
•   EC-Council Certified Security Analyst – E|CSA™
•   Licensed Penetration Tester – L|PT™
•   Computer Hacking Forensic Investigator – C|HFI™
•   Certified Information Systems Security Professional – (CISSP)®
•   More than 10 years of IT Security experience
About Us

The company Cyber 51 Ltd.

•   Brand Cyber 51 has been established in late 2011
•   Both Directors & Shareholders are “technical”
•   No loans or 3rd party investments
•   Previously trading as One 4 Networks Ltd. for 6 years
•   Security Line of Business became Cyber 51 Ltd.
•   Incorporated and fully VAT registered in the UK
•   Specializes in Cyber Security Consulting & Training
•   Works with top Consultants globally
•   Customers in more than 10 countries
•   Partners in 4 countries
About Us

Cyber 51 today

•   114% revenue increase from first quarter 2011 (O4N)
•   Customer services office in Worthing, UK
•   Working with strategic partners
•   Great Web popularity (SEO & AdWords)
•   Trusted by leading UK businesses
•   Focused on Cyber Security
About Us

Cyber 51 tomorrow – strategic plans

•   Establishing partnerships worldwide
•   Establishing business and office in LATAM (Mexico)
•   Establishing business and office in Germany
•   Establishing business and office in APAC (Singapore)
Sources of Revenue

                          11%

                                       10%
38%




                                 41%


      SEO   AdWords   Partners   Existing
Accreditations
Cyber 51 Certifications
Amongst Directors & Consultants the following certifications are
being held:

•   Certified Ethical Hacker – C|EH™
•   EC-Council Certified Security Analyst – E|CSA™
•   Licensed Penetration Tester – L|PT™
•   Computer Hacking Forensic Investigator – C|HFI™
•   Certified Information Systems Security Professional – (CISSP)®
•   Cisco CCIE and Cisco CCIE Security
•   Cisco CCSP and Cisco CCNP Security
•   UK Certifications CREST/CESG, CHECK
•   Many Consultants are UK Security cleared
Values
Cyber 51’s Values

•   To put our clients first.
•   To deliver value on every project.
•   To provide sound knowledge and expertise.
•   To provide best in market service to clients.
•   To Constantly educate our business and our staff.
•   To be dynamic and innovative.
•   To create solid partnerships with our clients.
Partnerships
Cyber 51 works with numerous partner to add value to clients.

Examples:
• Internet Service Providers
• Hardware Vendors and Resellers
• IT Consulting Firms
• Webhosting Firms
• Website & Application Development Firms
• Physical Security Firms
Clients
Cyber 51 serves clients in the following industries:

•   Gambling
•   Embassies
•   Armed Forces
•   Financials
•   Media
•   Web Hosting companies
Cyber Consulting Services


  Network                  Web App        Network        Web App
Penetration               Penetration   Vulnerability   Vulnerability
  Testing                   Testing     Assessments     Assessments




• Full NDAs & Contracts
• One time or recurring
• Manual & Automatic
• Full Reporting
• Fix Services (opt.)
• Great Value for money

www.cyber51.co.uk
Cyber Training Services

Cyber 51 also provides numerous Penetration Testing and Cyber
Security Training Services

• Unique 1-on-1 expert mentoring in a forum
• 7 month theory and hands-on mentoring program
• Tailored, bespoke Cyber Security Training

www.cyber51.com
Technical Portfolio



Penetration                 Vulnerability
  Testing                   Assessment




Vulnerability                   Training
 Fix Services
Technical Capabilities

Cyber 51 has strong delivery capabilities

•   25 Top Certified and experienced Consultants
•   All Consultants have 5+ years work experience
•   Multilingual (English, Spanish & German)
•   Our Consultants are spread across all continents
•   Many time zones can be served
•   Set up for global operation
Approach to Work

Cyber 51 delivers every project through Tiger teams

Thanks to the 25 Top Certified and experienced
Consultants, every Cyber 51’s engagement is delivered through
a tiger team including at least:

•   1 Tiger Team Leader
•   1 Report Writer
•   1 or 2 Network Penetration tester/s
•   1 or 2 Web Application Penetration tester/s
•   1 VoIP Penetration tester/s
Project 1



    Customer                Objectives         Technology

Internet Service Provider   Penetration Test   Manual & Automatic
           (UK)             40 IP Addresses     Assessment Tools
    Identity Protected
Project 2



Customer             Objectives         Technology

  Online Casino      Penetration Test    Manual Tools
       (UK)           of Web Servers     Core Impact
Identity Protected
Project 3



Customer               Objectives              Technology

Western Embassy      Wireless Security Audit      Airmagnet
       (UK)                                    Spectrum Expert
Identity Protected                              BackTrack Suite
Project 4



   Customer               Objectives         Technology

Large Media Corporation   Penetration Test   Manual & Automatic
          (UK)            55 IP Addresses     Assessment Tools
   Identity Protected
Contact

Martin Voelk
martin@cyber51.co.uk

Diego Spahn
diego@cyber51.co.uk
Thank You for your time!

More Related Content

What's hot

OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...OpenIDFoundation
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting StartedAlan Percy
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOpenIDFoundation
 

What's hot (7)

OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting Started
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
 

Similar to Cyber51 Company Presentation Public

Riscure Introduction
Riscure IntroductionRiscure Introduction
Riscure IntroductionRiscure
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
GrayCell Corporate Presentation
GrayCell Corporate PresentationGrayCell Corporate Presentation
GrayCell Corporate PresentationAmit-GrayCell
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Inflectra Partner Program 2022
Inflectra Partner Program 2022Inflectra Partner Program 2022
Inflectra Partner Program 2022Inflectra
 
Software Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueSoftware Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueInfopulse
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation EnglishTechnowave
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
About Miracle Software Systems
About Miracle Software SystemsAbout Miracle Software Systems
About Miracle Software SystemsPaul Byroj
 
About Miracle Software Systems
About Miracle Software SystemsAbout Miracle Software Systems
About Miracle Software SystemsPaul Byroj
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentationDonnie Eib
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Precisely
 
Best Digital Transformation Company Toronto
Best Digital Transformation Company TorontoBest Digital Transformation Company Toronto
Best Digital Transformation Company TorontoVilroTechnologies
 

Similar to Cyber51 Company Presentation Public (20)

Riscure Introduction
Riscure IntroductionRiscure Introduction
Riscure Introduction
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Best Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company IndiaBest Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company India
 
Protech Systems Group
Protech Systems GroupProtech Systems Group
Protech Systems Group
 
GrayCell Corporate Presentation
GrayCell Corporate PresentationGrayCell Corporate Presentation
GrayCell Corporate Presentation
 
PCC_overview
PCC_overviewPCC_overview
PCC_overview
 
Sales slide deck
Sales slide deckSales slide deck
Sales slide deck
 
Sales Slide Deck
Sales Slide DeckSales Slide Deck
Sales Slide Deck
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Inflectra Partner Program 2022
Inflectra Partner Program 2022Inflectra Partner Program 2022
Inflectra Partner Program 2022
 
Software Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueSoftware Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business Value
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation English
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Max IT4IT webinar powerpoint
Max IT4IT webinar powerpointMax IT4IT webinar powerpoint
Max IT4IT webinar powerpoint
 
About Miracle Software Systems
About Miracle Software SystemsAbout Miracle Software Systems
About Miracle Software Systems
 
About Miracle Software Systems
About Miracle Software SystemsAbout Miracle Software Systems
About Miracle Software Systems
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentation
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
 
Best Digital Transformation Company Toronto
Best Digital Transformation Company TorontoBest Digital Transformation Company Toronto
Best Digital Transformation Company Toronto
 

More from martinvoelk

Consulting Flyer
Consulting FlyerConsulting Flyer
Consulting Flyermartinvoelk
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51martinvoelk
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51martinvoelk
 
Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51martinvoelk
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Testmartinvoelk
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Ppctrainer Offers
Ppctrainer OffersPpctrainer Offers
Ppctrainer Offersmartinvoelk
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consultingmartinvoelk
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consultingmartinvoelk
 
Basic Adwords Course Outline
Basic Adwords Course OutlineBasic Adwords Course Outline
Basic Adwords Course Outlinemartinvoelk
 
Pronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training CoursesPronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training Coursesmartinvoelk
 
CCIE Bootcamp Training Courses
CCIE Bootcamp Training CoursesCCIE Bootcamp Training Courses
CCIE Bootcamp Training Coursesmartinvoelk
 
Servicios de la Seguridad delos Redes
Servicios de la Seguridad delos RedesServicios de la Seguridad delos Redes
Servicios de la Seguridad delos Redesmartinvoelk
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Servicesmartinvoelk
 
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner AssociateProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associatemartinvoelk
 

More from martinvoelk (16)

Consulting Flyer
Consulting FlyerConsulting Flyer
Consulting Flyer
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Ppctrainer Offers
Ppctrainer OffersPpctrainer Offers
Ppctrainer Offers
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
 
Basic Adwords Course Outline
Basic Adwords Course OutlineBasic Adwords Course Outline
Basic Adwords Course Outline
 
Pronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training CoursesPronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training Courses
 
CCIE Bootcamp Training Courses
CCIE Bootcamp Training CoursesCCIE Bootcamp Training Courses
CCIE Bootcamp Training Courses
 
Servicios de la Seguridad delos Redes
Servicios de la Seguridad delos RedesServicios de la Seguridad delos Redes
Servicios de la Seguridad delos Redes
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Services
 
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner AssociateProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
 

Cyber51 Company Presentation Public

  • 1. Cyber 51 Company Presentation Presented by Martin Voelk Co-Founder & Director
  • 2. Agenda Our About us Values Accreditations Partnerships Clients Services Technical Support Projects Capabilities options
  • 3. About Us Martin Voelk Co-Founder and CEO at Cyber 51 • Bachelors Degree in Computer Science • Cisco CCIE # 13708 • Cisco CCSP & Cisco CCNP Security • 4011, 4013 NSA InfoSec • Certified Ethical Hacker (C|EH) • 15 years of IT & Security Experience • Launched numerous successful Start-Ups
  • 4. About Us Diego Spahn Co-Founder and Technical Director at Cyber 51 • Certified Ethical Hacker – C|EH™ • EC-Council Certified Security Analyst – E|CSA™ • Licensed Penetration Tester – L|PT™ • Computer Hacking Forensic Investigator – C|HFI™ • Certified Information Systems Security Professional – (CISSP)® • More than 10 years of IT Security experience
  • 5. About Us The company Cyber 51 Ltd. • Brand Cyber 51 has been established in late 2011 • Both Directors & Shareholders are “technical” • No loans or 3rd party investments • Previously trading as One 4 Networks Ltd. for 6 years • Security Line of Business became Cyber 51 Ltd. • Incorporated and fully VAT registered in the UK • Specializes in Cyber Security Consulting & Training • Works with top Consultants globally • Customers in more than 10 countries • Partners in 4 countries
  • 6. About Us Cyber 51 today • 114% revenue increase from first quarter 2011 (O4N) • Customer services office in Worthing, UK • Working with strategic partners • Great Web popularity (SEO & AdWords) • Trusted by leading UK businesses • Focused on Cyber Security
  • 7. About Us Cyber 51 tomorrow – strategic plans • Establishing partnerships worldwide • Establishing business and office in LATAM (Mexico) • Establishing business and office in Germany • Establishing business and office in APAC (Singapore)
  • 8. Sources of Revenue 11% 10% 38% 41% SEO AdWords Partners Existing
  • 9. Accreditations Cyber 51 Certifications Amongst Directors & Consultants the following certifications are being held: • Certified Ethical Hacker – C|EH™ • EC-Council Certified Security Analyst – E|CSA™ • Licensed Penetration Tester – L|PT™ • Computer Hacking Forensic Investigator – C|HFI™ • Certified Information Systems Security Professional – (CISSP)® • Cisco CCIE and Cisco CCIE Security • Cisco CCSP and Cisco CCNP Security • UK Certifications CREST/CESG, CHECK • Many Consultants are UK Security cleared
  • 10. Values Cyber 51’s Values • To put our clients first. • To deliver value on every project. • To provide sound knowledge and expertise. • To provide best in market service to clients. • To Constantly educate our business and our staff. • To be dynamic and innovative. • To create solid partnerships with our clients.
  • 11. Partnerships Cyber 51 works with numerous partner to add value to clients. Examples: • Internet Service Providers • Hardware Vendors and Resellers • IT Consulting Firms • Webhosting Firms • Website & Application Development Firms • Physical Security Firms
  • 12. Clients Cyber 51 serves clients in the following industries: • Gambling • Embassies • Armed Forces • Financials • Media • Web Hosting companies
  • 13. Cyber Consulting Services Network Web App Network Web App Penetration Penetration Vulnerability Vulnerability Testing Testing Assessments Assessments • Full NDAs & Contracts • One time or recurring • Manual & Automatic • Full Reporting • Fix Services (opt.) • Great Value for money www.cyber51.co.uk
  • 14. Cyber Training Services Cyber 51 also provides numerous Penetration Testing and Cyber Security Training Services • Unique 1-on-1 expert mentoring in a forum • 7 month theory and hands-on mentoring program • Tailored, bespoke Cyber Security Training www.cyber51.com
  • 15. Technical Portfolio Penetration Vulnerability Testing Assessment Vulnerability Training Fix Services
  • 16. Technical Capabilities Cyber 51 has strong delivery capabilities • 25 Top Certified and experienced Consultants • All Consultants have 5+ years work experience • Multilingual (English, Spanish & German) • Our Consultants are spread across all continents • Many time zones can be served • Set up for global operation
  • 17. Approach to Work Cyber 51 delivers every project through Tiger teams Thanks to the 25 Top Certified and experienced Consultants, every Cyber 51’s engagement is delivered through a tiger team including at least: • 1 Tiger Team Leader • 1 Report Writer • 1 or 2 Network Penetration tester/s • 1 or 2 Web Application Penetration tester/s • 1 VoIP Penetration tester/s
  • 18. Project 1 Customer Objectives Technology Internet Service Provider Penetration Test Manual & Automatic (UK) 40 IP Addresses Assessment Tools Identity Protected
  • 19. Project 2 Customer Objectives Technology Online Casino Penetration Test Manual Tools (UK) of Web Servers Core Impact Identity Protected
  • 20. Project 3 Customer Objectives Technology Western Embassy Wireless Security Audit Airmagnet (UK) Spectrum Expert Identity Protected BackTrack Suite
  • 21. Project 4 Customer Objectives Technology Large Media Corporation Penetration Test Manual & Automatic (UK) 55 IP Addresses Assessment Tools Identity Protected
  • 23. Thank You for your time!