About Us




A highly capable partner

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training in the following fields: Cyber Advisory and National Security, Cyber Security Strategy and Information Assurance, Cyber Engineering and Architecture.

Sectyne has significant experience from industries and verticals such as National Government, Defence, Military, Energy, Law Enforcement, Aviation, Logistics, Telecommunications and Finance.

Our Services

The services and advisory that Sectyne offers can
be grouped into the following main categories:

Cyber engineering
and architecture

Secure your infrastructure: Present day security is often based on point solutions, but they do not fully address the ever-evolving threat environment.


Cybersecurity requires aligned operational IT-security management, where Sectyne provides technical expertise to its clients, ranging from access control, logging and security assessments to secure development practices, malware defenses and incident response.

Strategy and
Information assurance

Focus on what matters most: Risk-based insight and action-oriented recommendations that enable success and resilience.


We have a holistic and information-centric view. Sectyne helps some of its clients in developing cyber security strategies to facilitate secure digitization as well as implementing successful information assurance and security programs.

Cyber defence and
national security

Securing national critical infrastructure while being able to detect and counteract threats in cyberspace are crucial capabilities for governments.


Sectyne provides national security advisory, executive training and cyberspace operations expertise for governments, agencies and various organizations that operate critical infrastructure.

Contact us for more information

Incident Response and Investigation




Having an incident on your hands?

Systems and critical information locked down by ransomware. A former employee gains access to sensitive company information before leaving. A qualified state-sponsored threat actor is suspected of having penetrated a network. We've investigated all of the above.

Sectyne brings extensive experience in investigation and digital forensics to the table where we have the capabilities to either lead your investigation, or, support your incident response team with additional skills.

Contact us for more information

Training

CSFI is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners.

Learn More about CSFI

Meet our training partner - CSFI

The Cyber Security Forum Initiative (CSFI) and Sectyne is working together with training in the Scandinavian countries (note: not in the US or Canada) where we are proud to offer the following courses:

ICWOD Introduction to Cyber Warfare and Operations Design (2 days)
This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, as well as planning, organizing, and integrating cyberspace operations. The course will consist of presentations and exercises that will teach you how to develop a cyber-operations design and bring it to fruition. At the conclusion of the course, you will have a fundamental understanding of how to analyze, plan for, and execute cyberspace operations.
DCOE Defensive Cyber Operations Engineer (3 days)
In this course, students will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions and DCO requirements. The course builds on the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial use of tools and their associated techniques are presented to assess network vulnerabilities and to defend friendly networks against adversary threats.
The course covers the use of open source tools and websites for system configuration, penetration testing, and control testing. You will use Linux and Windows command lines and unleash an attack on target servers and analyze the results. Attacks and analysis of will expose you to live attacks in a controlled environment where students can see first-hand the adversary realm of possible actions, how to detect, mitigate, and counter such activities.
CCA Certified Collections Analyst (3 days)
This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cyber security threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cyber security efforts, and use collection activities to support decision making within organizational tiers.
CSCOE Certified SCADA Cyber Operations Engineer (5 days)
This course provides you with a thorough understanding of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) devices and their inner workings. You will learn how to execute cyber missions in which a SCADA environment is part of the greater cyberspace operational environment. By performing incident response on SCADA devices, you will learn in-depth concepts about SCADA devices.
RCCJOA Radicalization and Counter/Cyber Jihadist Operations Analyst (1 day)
A professional and academic discourse around radicalization with the intent to disrupt, isolate, and dismantle terrorist organizations. Some of the things you'll learn is how religious extremists use social media and social networks to recruit, the do's and do not's of government (including military) response to recruiting by religious extremists and how to read social media profiles of potential targets to understand the human terrain.

Notice: CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course.



News and Press Releases

2018-08-21 18:20
Sectyne and CSFI enter the Scandinavian Cyberspace Operations training market

Sectyne and the Cyber Security Forum Initiative (CSFI) are thrilled to announce that we now are working together with Cyberspace Operations training in Scandinavia where Sectyne has exclusive rights to conduct training in these countries (Sweden, Finland, Denmark, Norway and Iceland).


Read more (EN) >> | Läs mer (SE) >>


2018-08-12 17:00
Sectyne participates as Village Leader for DroneWarz at DEFCON 26 in Las Vegas

DroneWarz drone hacking games and challenges are designed for harnessing innovation and having fun with UAV emerging technologies. The Village had a Drone Hacking Arena with four (4) primary challenges each consisting of 3-4 flags/objectives:

- Drone Hacking Arena: Hack drones and determine their motives
- PWN-a-DR0NE: Drone Hacking Challenges
- CONQUER the CONTROLLER: Control Hacking Challenges
- PAYLOADZ: REDSKYZ (offensive drone application sandbox)


https://www.defcon.org/html/defcon-26/dc-26-villages.html


2018-08-02 14:20
Janne Haldesten at Sectyne is interviewed in Swedish Television Uutiset

Janne Haldesten at Sectyne was interviewed by Swedish Television Uutiset (in Finnish) where he described what current challenges and dangers our connected society is facing in regard to vulnerabilities, antagonists and cyberspace operations. The interview also touched the upcoming Swedish election in September and influence operations.


https://www.svtplay.se/uutiset


2018-06-20 11:00
Janne Haldesten at Sectyne confirmed speaker at Next Generation Threats in Stockholm and Gothenburg

Janne Haldesten at Sectyne will speak at Next Generation Threats in Stockholm (13 September) and Gothenburg (25 September) where he will address Artificial Intelligence and Machine Learning and how an adversary can exploit this.


https://techworld.event.idg.se/event/ngt-stockholm/#speakers-container

Contact us

Sectyne is present in the following locations:

Sweden

HQ Europe

Sectyne AB
Tillgängligheten 3
41701 Gothenburg
Sweden



Janne Haldesten

California

HQ Americas

Sectyne LLC
5506 Linden st
Dublin, CA 94568
United States



Johan Rydell

Washington D.C



Sectyne LLC
℅ The Cyber Security Forum Initiative
9720 Capital Court, Suite 200, Manassas, VA 20110
United States

Paul de Souza (POC)

Contact information

contact[at]sectyne[dot]com

PGP key is available upon request