SlideShare une entreprise Scribd logo
1  sur  10
Berezha Security
offensive-minded guardians of your safety
Walk through this presentation to find out
• What is Berezha’s goal and the
reason why we’ve created it
• What are our services and types of
their provisioning
• What methods and tools we use to
deliver high quality services
• What do our clients and partners
get from working with us
• Why our clients choose Berezha
• Who are Berezha’s founders and
leaders
berezhasecurity.com
Why we’ve created
Berezha Security
• We are deeply concerned by the shortage of
expertise and service quality in the
information security industry
• We’ve been in pentesting, network security,
and incident response for quite a while, so
we’ve decided to join our forces and bring
affordable high quality security services into
the market
• To help our clients access the best skill in the
industry, we leverage the power of the
community we have helped grow while
working together on creating UISGCON, the
largest infosec conference in Ukraine
• We think it is pretty cool and quite fun
berezhasecurity.com
Berezha services
Security Assessments
• Network penetration tests to reveal poor
security decisions that may harm your
business, and then help you remediate
those risks
• Social engineering audits to test your
employees’ resistance to the attacks on
human vulnerabilities
• IT infrastructure security audits to identify
security issues that undermine security and
compliance of your business
berezhasecurity.com
Berezha services
Improvement Consulting
• Continuous security assessments to keep
you up-to-date with your current security
posture
• Issue remediation to assist you in getting
rid of security vulnerabilities quickly and
efficiently
• Secure operations to help you continuously
maintain high level of information security
• Security trainings and knowledge transfer
to help your personnel build and maintain
effective security management processes
• Security awareness to help you leverage
your most effective and most under-
estimated security tool – your people
berezhasecurity.com
Berezha methods and tools
Standards and methodologies
• Penetration Testing Execution Standard
(PTES) – the industry’s most broad and
profound penetration testing manual
• Open Web Application Security Project
(OWASP) – the collection of standards
and guidelines for application security
best practice
• Open Source Security Testing
Methodology Manual (OSSTMM) – the
operational security performance
measurement and reporting system
Automation tools
• Kali Linux – the best professional
penetration testing distribution
• Rapid7 NeXpose – the fastest and most
accurate general purpose vulnerability
scanner
• BurpSuite Pro – the world leading web
application security assessment toolkit
• Metasploit Framework – the best
exploitation and post-exploitation
platform maintained by the pentesting
community in its best
berezhasecurity.com
Working with Berezha
For our clients
• Straightforward online price and
duration calculator based on
your desired scope
• 15% discount for returning
customers
• One free retest within 2 months
after pentest completion
• Following retests at 15% of
initial pentest price
For our partners
• White-label services at 25%
discount for partners who wish
to fully engage into the project
contracting and delivery
• 10% commission per successful
lead generated
• Client conditions don’t apply
berezhasecurity.com
Why Berezha
• Highly qualified penetration testers with tens of
projects and happy customers behind them
• Plentifully certified core team
• Social engineering AKA “human hacking”
• Timely delivery of results
• Ability to emulate real world attacks of any complexity
• Flexible pricing based on your priorities
• Competitive price
berezhasecurity.com
Berezha leadership
Kos Korsun
Director
As former deputy head of Cybercrime
Division at Security Service of Ukraine,
Kostyantyn was one of the founders and
the first head of CERT-UA. After resigning
from the service, Kos acted as Regional
Director for Ukrainian Research Office of
iSIGHT Partners, international cyber
threat intelligence company.
Currently, Kos combines numerous roles
in Ukrainian cyber security community,
including his Chairmanship for NGO
Ukrainian Information Security Group
and strategic leadership for Berezha
Security.
berezhasecurity.com
Vlad Styran
Director of Operations
Vlad is an internationally known infosec
expert with 10+ years of experience in
Penetration Testing, Security Audit and
Consulting. Vlad currently holds OSCP, CISSP,
and CISA credentials and was certified as
C|EH, ISO27001LA, and many more
throughout his career. Vlad often speaks at
infosec conferences on the topics of Social
Engineering threats and Penetration Testing
methods and techniques.
At Berezha, Vlad is responsible for resource
management and delivery of high quality
security services.
Andrey Loginov
VP, Business Development
Andrey is an expert in the field of cyber
security and telecommunications with
more than 15 years of experience in
numerous international endeavors.
Andrey acted as CTO and Solution
Architect at Internet Service Providers,
telco operators, and system integration
companies.
At Berezha, Andrey is aimed at our
business success, constant growth of
operations, and engaging new clients and
commercial opportunities.
Berezha contacts
Please send your questions and
inquiries to:
• sales@berezhasecurity.com
• PGP pubkey: DF4B8DF5
or call us:
• +380 93 164 4558
For more information and the online
pentest price calculator, please visit
https://berezhasecurity.com
berezhasecurity.com

Contenu connexe

Tendances

Tendances (20)

WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
 
Collaborative security : Securing open source software
Collaborative security : Securing open source softwareCollaborative security : Securing open source software
Collaborative security : Securing open source software
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
 
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
 
Security as a new metric for Business, Product and Development Lifecycle
Security as a new metric for Business, Product and Development LifecycleSecurity as a new metric for Business, Product and Development Lifecycle
Security as a new metric for Business, Product and Development Lifecycle
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin?
 
Agile and Secure Development
Agile and Secure DevelopmentAgile and Secure Development
Agile and Secure Development
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
Cybersecurity career options & Getting started
Cybersecurity career options & Getting started  Cybersecurity career options & Getting started
Cybersecurity career options & Getting started
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
OWASP Top 10 practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav BreslavskyiOWASP Top 10 practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav Breslavskyi
 
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 

En vedette

Социальная инженерия для инженеров
Социальная инженерия для инженеровСоциальная инженерия для инженеров
Социальная инженерия для инженеров
Vlad Styran
 
Процедура внедрения СУИБ в банке: основные шаги и подводные камни
Процедура внедрения СУИБ в банке: основные шаги и подводные камниПроцедура внедрения СУИБ в банке: основные шаги и подводные камни
Процедура внедрения СУИБ в банке: основные шаги и подводные камни
Vlad Styran
 
Web Application Firewalls / Иван Новиков (ONsec)
Web Application Firewalls / Иван Новиков (ONsec)Web Application Firewalls / Иван Новиков (ONsec)
Web Application Firewalls / Иван Новиков (ONsec)
Ontico
 
Социальные аспекты ИБ
Социальные аспекты ИБСоциальные аспекты ИБ
Социальные аспекты ИБ
Vlad Styran
 
Прелюдия к атаке: практика и автоматизация OSINT
Прелюдия к атаке: практика и автоматизация OSINTПрелюдия к атаке: практика и автоматизация OSINT
Прелюдия к атаке: практика и автоматизация OSINT
Vlad Styran
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buy
Vlad Styran
 

En vedette (20)

Социальная инженерия для инженеров
Социальная инженерия для инженеровСоциальная инженерия для инженеров
Социальная инженерия для инженеров
 
Путевые заметки социального инженера
Путевые заметки социального инженераПутевые заметки социального инженера
Путевые заметки социального инженера
 
Процедура внедрения СУИБ в банке: основные шаги и подводные камни
Процедура внедрения СУИБ в банке: основные шаги и подводные камниПроцедура внедрения СУИБ в банке: основные шаги и подводные камни
Процедура внедрения СУИБ в банке: основные шаги и подводные камни
 
Методы выполнения требования 6.6 PCI DSS – практический выбор
Методы выполнения требования 6.6 PCI DSS – практический выборМетоды выполнения требования 6.6 PCI DSS – практический выбор
Методы выполнения требования 6.6 PCI DSS – практический выбор
 
WAF наше все?!
WAF наше все?!WAF наше все?!
WAF наше все?!
 
Cisco Advanced Malware Protection для руководителей, принимающих решения
Cisco Advanced Malware Protection для руководителей, принимающих решенияCisco Advanced Malware Protection для руководителей, принимающих решения
Cisco Advanced Malware Protection для руководителей, принимающих решения
 
Web Application Firewalls / Иван Новиков (ONsec)
Web Application Firewalls / Иван Новиков (ONsec)Web Application Firewalls / Иван Новиков (ONsec)
Web Application Firewalls / Иван Новиков (ONsec)
 
Наступательная безопасность: шпаргалка заказчика тестов на проникновение
Наступательная безопасность: шпаргалка заказчика тестов на проникновениеНаступательная безопасность: шпаргалка заказчика тестов на проникновение
Наступательная безопасность: шпаргалка заказчика тестов на проникновение
 
Социальные аспекты ИБ
Социальные аспекты ИБСоциальные аспекты ИБ
Социальные аспекты ИБ
 
правда про ложь
правда про ложьправда про ложь
правда про ложь
 
Imperva, держи марку!
Imperva, держи марку! Imperva, держи марку!
Imperva, держи марку!
 
Прелюдия к атаке: практика и автоматизация OSINT
Прелюдия к атаке: практика и автоматизация OSINTПрелюдия к атаке: практика и автоматизация OSINT
Прелюдия к атаке: практика и автоматизация OSINT
 
Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016
 
Кібер-Шмібер
Кібер-ШміберКібер-Шмібер
Кібер-Шмібер
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buy
 
Построение Secure Development Lifecycle
Построение Secure Development Lifecycle Построение Secure Development Lifecycle
Построение Secure Development Lifecycle
 
Защищённый периметр. Он есть или его нет?
Защищённый периметр. Он есть или его нет?Защищённый периметр. Он есть или его нет?
Защищённый периметр. Он есть или его нет?
 
Как выбрать Web Application Firewall
Как выбрать Web Application FirewallКак выбрать Web Application Firewall
Как выбрать Web Application Firewall
 
Развитие безопасных технологий в России в условиях курса на импортозамещение
Развитие безопасных технологий  в России в условиях курса  на импортозамещениеРазвитие безопасных технологий  в России в условиях курса  на импортозамещение
Развитие безопасных технологий в России в условиях курса на импортозамещение
 
#root это только начало
#root это только начало#root это только начало
#root это только начало
 

Similaire à Berezha Security

Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
Ferenc Fresz
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
Bryan Len
 

Similaire à Berezha Security (20)

It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Infoprive Brochure
Infoprive Brochure Infoprive Brochure
Infoprive Brochure
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
VSEC Company Profile
VSEC Company ProfileVSEC Company Profile
VSEC Company Profile
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
craw-security-services.pdf
craw-security-services.pdfcraw-security-services.pdf
craw-security-services.pdf
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
 

Plus de Vlad Styran

Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Vlad Styran
 
Центр оперативного управления информационной безопасностью
Центр оперативного управления информационной безопасностьюЦентр оперативного управления информационной безопасностью
Центр оперативного управления информационной безопасностью
Vlad Styran
 

Plus de Vlad Styran (11)

Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
 
Threat Modeling 101
Threat Modeling 101Threat Modeling 101
Threat Modeling 101
 
BSides Kharkiv 2018: Social-engineering your quality of work, personal, and s...
BSides Kharkiv 2018: Social-engineering your quality of work, personal, and s...BSides Kharkiv 2018: Social-engineering your quality of work, personal, and s...
BSides Kharkiv 2018: Social-engineering your quality of work, personal, and s...
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 
NoNameCon partnership opportunities
NoNameCon partnership opportunitiesNoNameCon partnership opportunities
NoNameCon partnership opportunities
 
BruCON 0x09 Building Security Awareness Programs That Don't Suck
BruCON 0x09 Building Security Awareness Programs That Don't SuckBruCON 0x09 Building Security Awareness Programs That Don't Suck
BruCON 0x09 Building Security Awareness Programs That Don't Suck
 
Организация, культура, и управление кибер-безопасностью
Организация, культура, и управление кибер-безопасностьюОрганизация, культура, и управление кибер-безопасностью
Организация, культура, и управление кибер-безопасностью
 
Cybersecurity Framework 021214 Final UA
Cybersecurity Framework 021214 Final UACybersecurity Framework 021214 Final UA
Cybersecurity Framework 021214 Final UA
 
Fantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from themFantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from them
 
Использование приватных, публичных и гибридных облаков для обеспечения информ...
Использование приватных, публичных и гибридных облаков для обеспечения информ...Использование приватных, публичных и гибридных облаков для обеспечения информ...
Использование приватных, публичных и гибридных облаков для обеспечения информ...
 
Центр оперативного управления информационной безопасностью
Центр оперативного управления информационной безопасностьюЦентр оперативного управления информационной безопасностью
Центр оперативного управления информационной безопасностью
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Berezha Security

  • 2. Walk through this presentation to find out • What is Berezha’s goal and the reason why we’ve created it • What are our services and types of their provisioning • What methods and tools we use to deliver high quality services • What do our clients and partners get from working with us • Why our clients choose Berezha • Who are Berezha’s founders and leaders berezhasecurity.com
  • 3. Why we’ve created Berezha Security • We are deeply concerned by the shortage of expertise and service quality in the information security industry • We’ve been in pentesting, network security, and incident response for quite a while, so we’ve decided to join our forces and bring affordable high quality security services into the market • To help our clients access the best skill in the industry, we leverage the power of the community we have helped grow while working together on creating UISGCON, the largest infosec conference in Ukraine • We think it is pretty cool and quite fun berezhasecurity.com
  • 4. Berezha services Security Assessments • Network penetration tests to reveal poor security decisions that may harm your business, and then help you remediate those risks • Social engineering audits to test your employees’ resistance to the attacks on human vulnerabilities • IT infrastructure security audits to identify security issues that undermine security and compliance of your business berezhasecurity.com
  • 5. Berezha services Improvement Consulting • Continuous security assessments to keep you up-to-date with your current security posture • Issue remediation to assist you in getting rid of security vulnerabilities quickly and efficiently • Secure operations to help you continuously maintain high level of information security • Security trainings and knowledge transfer to help your personnel build and maintain effective security management processes • Security awareness to help you leverage your most effective and most under- estimated security tool – your people berezhasecurity.com
  • 6. Berezha methods and tools Standards and methodologies • Penetration Testing Execution Standard (PTES) – the industry’s most broad and profound penetration testing manual • Open Web Application Security Project (OWASP) – the collection of standards and guidelines for application security best practice • Open Source Security Testing Methodology Manual (OSSTMM) – the operational security performance measurement and reporting system Automation tools • Kali Linux – the best professional penetration testing distribution • Rapid7 NeXpose – the fastest and most accurate general purpose vulnerability scanner • BurpSuite Pro – the world leading web application security assessment toolkit • Metasploit Framework – the best exploitation and post-exploitation platform maintained by the pentesting community in its best berezhasecurity.com
  • 7. Working with Berezha For our clients • Straightforward online price and duration calculator based on your desired scope • 15% discount for returning customers • One free retest within 2 months after pentest completion • Following retests at 15% of initial pentest price For our partners • White-label services at 25% discount for partners who wish to fully engage into the project contracting and delivery • 10% commission per successful lead generated • Client conditions don’t apply berezhasecurity.com
  • 8. Why Berezha • Highly qualified penetration testers with tens of projects and happy customers behind them • Plentifully certified core team • Social engineering AKA “human hacking” • Timely delivery of results • Ability to emulate real world attacks of any complexity • Flexible pricing based on your priorities • Competitive price berezhasecurity.com
  • 9. Berezha leadership Kos Korsun Director As former deputy head of Cybercrime Division at Security Service of Ukraine, Kostyantyn was one of the founders and the first head of CERT-UA. After resigning from the service, Kos acted as Regional Director for Ukrainian Research Office of iSIGHT Partners, international cyber threat intelligence company. Currently, Kos combines numerous roles in Ukrainian cyber security community, including his Chairmanship for NGO Ukrainian Information Security Group and strategic leadership for Berezha Security. berezhasecurity.com Vlad Styran Director of Operations Vlad is an internationally known infosec expert with 10+ years of experience in Penetration Testing, Security Audit and Consulting. Vlad currently holds OSCP, CISSP, and CISA credentials and was certified as C|EH, ISO27001LA, and many more throughout his career. Vlad often speaks at infosec conferences on the topics of Social Engineering threats and Penetration Testing methods and techniques. At Berezha, Vlad is responsible for resource management and delivery of high quality security services. Andrey Loginov VP, Business Development Andrey is an expert in the field of cyber security and telecommunications with more than 15 years of experience in numerous international endeavors. Andrey acted as CTO and Solution Architect at Internet Service Providers, telco operators, and system integration companies. At Berezha, Andrey is aimed at our business success, constant growth of operations, and engaging new clients and commercial opportunities.
  • 10. Berezha contacts Please send your questions and inquiries to: • sales@berezhasecurity.com • PGP pubkey: DF4B8DF5 or call us: • +380 93 164 4558 For more information and the online pentest price calculator, please visit https://berezhasecurity.com berezhasecurity.com