OPINIONS
 
How do you prepare your organisation most effectively against cyber-attacks and how do you balance the ROI at the same time? The short answer is: Create a plan and practice it!
WAR STORIES
 
Our researchers, Mario Rivas and Daniel Romero, discovered remote vulnerabilities in all of the printers they tested through various attack vectors, uncovering a large number of zero-day vulnerabilities in the process.
OPINIONS
 
Financial institutions in Denmark are regulated by TIBER-DK, which is a Red Team test framework, established with the aim of strengthening cyber security in the sector. A TIBER test is a long and resource-consuming process that requires months of preparation and planning for even the most security- (...)
EVENT
 
This half-day tabletop exercise will walk you through a cyber crisis with an interactive simulation, giving you an opportunity to make some of the decisions that you may face during a cyber crisis. You will face difficult choices and time pressure, where the stakes and the risk of making a costly (...)
OPINIONS
 
Considering security holistically the the development of APIs, will protect customer data in Open Banking and make the task less complex. It is about embracing the opportunities of Open Banking instead of its limitations.
EVENT
 
At this complimentary event, we will take you on a voyage through the current threat landscape for the financial sector and show you how clients are defrauded on desktop and mobile platforms.
OPINIONS
 
The basis for mandating financial institutions to carry out a TIBER test, is to ensure that an entire nation does not come to a standstill if one of its largest banks suffers a severe cyber attack. As this is the logic behind the initiative, then why shouldn’t other critical sectors be inspired by (...)
OPINIONS
 
When you are responsible for managing your information security, ideally you would want to cover every possible angle. But a number of factors, such as financial resources, time and competencies, force you to prioritise. If prioritising is a challenge, a good exercise is to simulate a constraint. (...)
EVENT
 
This session will walk you through a cyber crisis with an interactive simulation, giving you an opportunity to make some of the decisions that you may face during a cyber crisis. You will face difficult choices and time pressure, where the stakes and the risk of making a costly mistake are high - (...)
OPINIONS
 
Director of Risk Management & Governance in FortConsult, Peter Brahe talks about what he is looking for when hiring new IT security consultants, how talent is developed in FortConsult, and the requirements that he sets for his consultants.
WAR STORIES
 
Read about how our Black Team succeeded in a physical breach of a seemingly secure organisation with good physical security controls, with the help of a somewhat forgetful security guard.
EVENT
 
FortConsult invites you to a free event, where we will show you how to measure and improve your security posture.
EVENT
 
Join us for our next "A Hacker's Confessions" event in Copenhagen, where you will witness a live demo of how a hacker gains control of a common device on your network, takes over its functionalities and uses it as a malicious actor that is incredibly hard to monitor by your own IT or (...)
NEWS
 
FortConsult's Piotr Duszynski has developed a tool that automates phishing campaigns and bypasses traditional two-factor authentication in the matter of seconds. Read more about it here.
EVENT
 
FortConsult will be participating in Denmark's largest infosec conference, InfoSecurity Denmark, on the 1st and 2nd of May. You'll be able to find us at booth 221 (next to the keynote theatre) throughout the two days.