SlideShare a Scribd company logo
1 of 33
Cybercom Poland
General Overview
cybercom.pl
is doing things for the bigger
purpose than the sum of tasks
is prototyping solutions instead
of theoretical considerations
is transparency, openness and
honesty to the customer
Passion Innovation Trust
Our values
POLAND
is identified as a country
with the strongest
underlying fundamentals
to potentially outsource IT
solutions.
From the Center of Europe
STABLE ECONOMY
with a dynamically growing IT market
COST ATTRACTIVENESS
Why Poland?
EFFECTIVE COORDINATION
thanks to geographical proximity
CULTURAL SIMILARITIES
FAMOUS
Eastern - European school of programming
(great IT Universities)
230experts in web and mobile
technologies
Member of SPCC – Scandinavian-Polish Chamber of Commerce since 2008
offices in major IT centresmastered technologies
years of experience per average
employee
years on the market client countries
19
20+ 3
10+ 6
Cybercom Poland strenghts
Our strenghts
Our Swedish roots combined with Polish
expertise and technical know-how guarantee
optimal results in delivering cutting edge
solutions.
While we use Swedish best practices to exceed
expectations and provide impeccable quality, we
maintain our Polish pricing and geeky attitude.
Accompanying our clients through every project
stage from early design to delivery, deployment,
and ongoing maintenance.
PROJECT BASED
end to end project management:
technical design, delivery and
deployment
RESOURCE BASED
our technical teams collaborate with your
project team
Custom collaboration
designdelivery
deployment
Software House
Security Division
IoT & Automotive
Our assets
Software House
Our assets
• nearshoring instead of outsourcing
• collocation and synergy effect
Software House
• open communication and transparency
• agile approach and iterations
Our core business in Software
House is to deliver superior
quality software in a timely
manner and continuously
improve teams’ velocity using
the scrum process.
1
2 3
4
56
ITERATIONS
back-end
technologies
frontend
technologies
data bases
mobile
technologies
QA
Manual
Automated
(selenium,
windmill)
Non-SQL
Diverse technical skills
Sprint process
sprint planning
1
sprint planning
business
catchup
daily scrum
1 2
sprint planning
business
catchup
daily scrum
backlog
refinement
1
3
2
sprint planning
business
catchup
daily scrum
backlog
refinement
sprint review
1
3
2
4
sprint planning
business
catchup
daily scrum
backlog
refinement
sprint reviewsprint retrospective
1
3
2
45
sprint planning
business
catchup
daily scrum
backlog
refinement
sprint reviewsprint retrospective
renew your
forecast
DEVELOPMENT AND
TESTING
1
3
2
45
Tooling
GIT + branching
practices description
Continuous integration
tools
Jira Agile
Confluence
Skype For Business /
Skype
Slack (communication
channels definition)
Yammer Trello
Out of the box
technology stack
Tooling:
Security
Division
Our assets
Security Division
Testing of data security and compliance with international and local laws and policies (PCI-DSS, personal
information security regulations etc.):
 physical office/infrastructure security testing
 dumpster-diving
 office security policies review
Data Security & Compliance
 IT infrastructure security (WiFi,
access to servers and routers, etc.)
 social engineering
Mobile Apps Security
Static and dynamic analysis of mobile applications security,
including:
sensitive data
transmission (MITM
attack)
local data storage
(file formats,
encryption etc.)
user authentication
and authorization
methods
tampering with UI
or settings
testing against
known server-side
web application
risks (OWASP)
source-code
analysis
reverse-
engineering
deassembly
Black/Grey/White testing of:
Web Applications Security
incorrect handling of
temporary files on the user
side (i.e. cookies)
improper storage and
transmission of data
ActiveX and Adobe Flash
components decompilation
and deobfuscation
brute-forcing and
dictionary attacks
captcha security
password-reverting
functionality security
buffer/stack overflows incorrect error handling
code
decompiling/deassembly/d
eobfuscation/unpacking
tampering with UI, settings
and registry
anti-piracy (user
registration, trial version
limitations etc.)
localization issues
pentesting against known attacks (SQL injection, command injection, XSS, LCI, RCI, CSRF, directory traversal, MITM and
all other from OWASP list)
IoT & Automotive
Our assets
We discover and develop OPPORTUNITIES for you and with you
Increased revenue
Reduced operational
expenses
Increased differentiantion
Data discovery and insight
Streamlined customer
services
Reduced risk Regulatory compliance
Connected brand strategy
Increased security
IoT Strategies for Diversified Business
DIGITAL TRANSFORMATION PROJECTS
Business advisory
Prototype design
Deployment
What we do in IoT?
1
2
3
Concept preparation
Testing: HW & SW
Support
"They listen to their customers well. Whenever we have
a problem, they make an effort to solve it together with
us, without being pushy."
— Technology Director at CompoSIDE
"They [Cybercom] are reliable, especially when initiating
new projects or activities. When we request a specific
resource to be delivered at a given time, I can be 100%
sure that it will happen."
— Manager ​
"Cybercom has been very good to work with, analyzing
and coming up with new suggestions on how we could
modernize this system into a more test-friendly system."
Core clients
HRK
EMPIK ECOMMERCE
GCS
SIERPC
BISNODE
E-RECRUITER
COMPOSIDE
HIAB
GIZAGIG
SKANSKA
INTEL
CLEAN MOTION
IMS HEALTH
STRUCTEAM
MODUL SYSTEM
ERICSSON
VOLVO
DORO
VUBIQUITY
TELENOR
ROSSMANN
OUTOTEC
SAS
Agata Maroń
Head Of Sales Development
Warsaw
agata.maron@cybercom.com
agata.agata779
+48 607 676 766
LET’S TALK
cybercom.pl

More Related Content

Viewers also liked

Viewers also liked (17)

10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call Questions
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot Tokyo
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-Thon
 
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
Infographic: Medicare Marketing: Direct Mail: Still The #1 Influencer For Tho...
 
The Be-All, End-All List of Small Business Tax Deductions
The Be-All, End-All List of Small Business Tax DeductionsThe Be-All, End-All List of Small Business Tax Deductions
The Be-All, End-All List of Small Business Tax Deductions
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your Business
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies
 
30 Day $100 Savings Challenge 04-16
30 Day $100 Savings Challenge 04-1630 Day $100 Savings Challenge 04-16
30 Day $100 Savings Challenge 04-16
 
The Developer CEO - Peter Coppinger, CEO at Teamwork
The Developer CEO - Peter Coppinger, CEO at TeamworkThe Developer CEO - Peter Coppinger, CEO at Teamwork
The Developer CEO - Peter Coppinger, CEO at Teamwork
 
La responsabilidad penal de las empresas y la corrupción
La responsabilidad penal de las empresas y la corrupciónLa responsabilidad penal de las empresas y la corrupción
La responsabilidad penal de las empresas y la corrupción
 
Grant Thornton : Gestion des prévisions et comptabilité analytique.pdf
Grant Thornton :  Gestion des prévisions et comptabilité analytique.pdfGrant Thornton :  Gestion des prévisions et comptabilité analytique.pdf
Grant Thornton : Gestion des prévisions et comptabilité analytique.pdf
 
逆説のカスタマーサクセス
逆説のカスタマーサクセス逆説のカスタマーサクセス
逆説のカスタマーサクセス
 

Similar to Cybercom Poland Overview: Why Poland Is Great For Outsourcing IT Services

Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15
Ben Hay
 
Scandinavia
ScandinaviaScandinavia
Scandinavia
jaromik
 
SII IT Services
SII IT ServicesSII IT Services
SII IT Services
jaromik
 
Netlabs IT Diksha diploma for student who appeared for or cleared class 12
Netlabs IT Diksha diploma for student who appeared for or cleared class 12Netlabs IT Diksha diploma for student who appeared for or cleared class 12
Netlabs IT Diksha diploma for student who appeared for or cleared class 12
Netlabs ITS
 
BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docx
garnerangelika
 
OptiCom Company Presentation
OptiCom Company PresentationOptiCom Company Presentation
OptiCom Company Presentation
Vladimir PAVLENKO
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Cegonsoft Fames
 
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Cegonsoft Fames
 

Similar to Cybercom Poland Overview: Why Poland Is Great For Outsourcing IT Services (20)

Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15
 
Back end developer
Back end developer Back end developer
Back end developer
 
Consulthink Overview
Consulthink OverviewConsulthink Overview
Consulthink Overview
 
Ncct Software Projects Intro & Presentation
Ncct   Software Projects Intro & PresentationNcct   Software Projects Intro & Presentation
Ncct Software Projects Intro & Presentation
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentation
 
AboutWeb
AboutWebAboutWeb
AboutWeb
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Scandinavia
ScandinaviaScandinavia
Scandinavia
 
SII IT Services
SII IT ServicesSII IT Services
SII IT Services
 
Netlabs IT Diksha diploma for student who appeared for or cleared class 12
Netlabs IT Diksha diploma for student who appeared for or cleared class 12Netlabs IT Diksha diploma for student who appeared for or cleared class 12
Netlabs IT Diksha diploma for student who appeared for or cleared class 12
 
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docx
 
OptiCom Company Presentation
OptiCom Company PresentationOptiCom Company Presentation
OptiCom Company Presentation
 
Information Security
Information SecurityInformation Security
Information Security
 
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
 
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
 
Greensoft general presentation ver.4.2
Greensoft general presentation ver.4.2Greensoft general presentation ver.4.2
Greensoft general presentation ver.4.2
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
Tekroots Profile Presentation
Tekroots Profile PresentationTekroots Profile Presentation
Tekroots Profile Presentation
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Cybercom Poland Overview: Why Poland Is Great For Outsourcing IT Services