Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training in the following fields: Cyber Advisory and National Security, Cyber Security Strategy and Information Assurance, Cyber Engineering and Architecture.
Sectyne has significant experience from industries and verticals such as National Government, Defence, Military, Energy, Law Enforcement, Aviation, Logistics, Telecommunications and Finance.
The services and advisory that Sectyne offers can
be grouped into the following main categories:
Secure your infrastructure: Present day security is often based on point solutions, but they do not fully address the ever-evolving threat environment.
Cybersecurity requires aligned operational IT-security management, where Sectyne provides technical expertise to its clients, ranging from access control, logging and security assessments to secure development practices, malware defenses and incident response.
Focus on what matters most: Risk-based insight and action-oriented recommendations that enable success and resilience.
We have a holistic and information-centric view. Sectyne helps some of its clients in developing cyber security strategies to facilitate secure digitization as well as implementing successful information assurance and security programs.
Securing national critical infrastructure while being able to detect and counteract threats in cyberspace are crucial capabilities for governments.
Sectyne provides national security advisory, executive training and cyberspace operations expertise for governments, agencies and various organizations that operate critical infrastructure.
Systems and critical information locked down by ransomware. A former employee gains access to sensitive company information before leaving. A qualified state-sponsored threat actor is suspected of having penetrated a network. We've investigated all of the above.
Sectyne brings extensive experience in investigation and digital forensics to the table where we have the capabilities to either lead your investigation, or, support your incident response team with additional skills.
CSFI is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners.
Learn More about CSFI
The Cyber Security Forum Initiative (CSFI) and Sectyne is working together with training in the Scandinavian countries (note: not in the US or Canada) where we are proud to offer the following courses:
|ICWOD||Introduction to Cyber Warfare and Operations Design (2 days)|
|This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, as well as planning, organizing, and integrating cyberspace operations. The course will consist of presentations and exercises that will teach you how to develop a cyber-operations design and bring it to fruition. At the conclusion of the course, you will have a fundamental understanding of how to analyze, plan for, and execute cyberspace operations.|
|DCOE||Defensive Cyber Operations Engineer (3 days)|
In this course, students will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions and DCO requirements. The course builds on the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial use of tools and their associated techniques are presented to assess network vulnerabilities and to defend friendly networks against adversary threats.
The course covers the use of open source tools and websites for system configuration, penetration testing, and control testing. You will use Linux and Windows command lines and unleash an attack on target servers and analyze the results. Attacks and analysis of will expose you to live attacks in a controlled environment where students can see first-hand the adversary realm of possible actions, how to detect, mitigate, and counter such activities.
|CCA||Certified Collections Analyst (3 days)|
|This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cyber security threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cyber security efforts, and use collection activities to support decision making within organizational tiers.|
|CSCOE||Certified SCADA Cyber Operations Engineer (5 days)|
|This course provides you with a thorough understanding of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) devices and their inner workings. You will learn how to execute cyber missions in which a SCADA environment is part of the greater cyberspace operational environment. By performing incident response on SCADA devices, you will learn in-depth concepts about SCADA devices.|
|RCCJOA||Radicalization and Counter/Cyber Jihadist Operations Analyst (1 day)|
|A professional and academic discourse around radicalization with the intent to disrupt, isolate, and dismantle terrorist organizations. Some of the things you'll learn is how religious extremists use social media and social networks to recruit, the do's and do not's of government (including military) response to recruiting by religious extremists and how to read social media profiles of potential targets to understand the human terrain.|
Notice: CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course.
Janne Haldesten at Sectyne confirmed speaker at Next Generation Threats in Stockholm and Gothenburg
Janne Haldesten at Sectyne will speak at Next Generation Threats in Stockholm (13 September) and Gothenburg (25 September) where he will address Artificial Intelligence and Machine Learning and how an adversary can exploit this.
Sectyne is present in the following locations:
5506 Linden st
Dublin, CA 94568
℅ The Cyber Security Forum Initiative
9720 Capital Court, Suite 200, Manassas, VA 20110
Paul de Souza (POC)
PGP key is available upon request