to manage information (potentially including PII) according to contracts (consulting, audit, training, research…);
to learn from past experience in our projects for upcoming projects (knowledge management), or to train new staff;
to carry out contracts including invoicing and justification of work performed (e.g. with timesheets and progress reports);
to manage IT activities with the aim of information security (including service availability), and to detect and handle threats, vulnerabilities, risks, and incidents;
to manage employment contracts, to ensure workplace safety, and to manage application information;
to demonstrate consistency of our accounting system to tax authorities and interested parties;
to perform forensic analysis and propose effective reactions to security events, to detect frauds and vulnerabilities, to understand malware and malware producers, and to share this knowledge with other security experts fighting against cybercrime;
trace the validity of our reports and advice for justifying professionalism.
To apply your rights for access, correction, reporting misuse, or withdrawing consent, please send an email to firstname.lastname@example.org.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
We use the following third party services:
Google Maps is used on the contact page of our website.
Google reCAPTCHA is used to protect our forms.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses the following additional cookies from matomo.itrust.lu:
Please enable Strictly Necessary Cookies first so that we can save your preferences!
On 21st of June 2017, itrust consulting marked its 10th anniversary with a memorable celebration in LaLux Auditorium in Leudelange.
Together with our partners and customers, we enjoyed the first part of the event - conference with the notable key note speakers
Mrs Viviane Reding, Member of the European Parliament, Professor Bart Preneel, Katholieke Universiteit Leuven and Mrs Larissa Best,
co-founder of the think-tank Équilibre.
The last speech was delivered by Mr Carlo Harpes, CEO of itrust consulting, who gave an interesting overview on the development path of itrust consulting, past and future challenges and the upcoming plans lying ahead.
The conference was accompanied by entertainment pauses delivered by the excellent performance of PHP Quartett musicians.
During the second part of the event, we enjoyed a walking gourmet dinner during which we exchanged ideas through conversations and networking.
We would like to thank all participants for contributing to the great atmosphere and for allowing us to share this moment with you!
Just before its 10th anniversary celebration, itrust consulting received the official certification of its Information Security Management System (ISMS) from International Certification Trust Services (ICTS) S.à.r.l., with regards to the standard ISO/IEC 27001.
The processes and related documentation established at itrust consulting, covering aspects like risk assessment, business continuity management, data protection, cryptography, operational security, etc., have been declared compliant with the highest standards for Information Security.
Dr. Carlo Harpes, Managing Director and founder of itrust consulting, summarised: ”The security of customer data and data protection according to the GDPR are among our highest priorities, and this certification confirms that our approach works not only for large institutions that have already been certified with the assistance of itrust consulting, but also for SMEs and even micro-enterprises.”
itrust consulting proudly announces the release of a new version of its risk assessment and treatment web application TRICK Service.
TRICK Service is an easy to use application designed to:
perform risk management following ISO 31000, ISO/IEC 27005, and ISO/IEC 27001;
support quantitatively AND qualitative risk estimation;
prepare data protection impact assessments (DPIA): TRICK Service enables to perform impact assessments in compliance with the European Union General Data Protection Regulation.
TRICK Service is composed of many advanced and useful features such as multi-user support, access control, automatic creation of risk analysis reports, risk analysis versioning, visualisation of risk evolution, definition of risk profiles. Furthermore the user has the option to embed his own security control catalogues or international standards adapted to its requirements.
In order to get your 30 days free access rights to our TRICK Service demo verison, feel free to create your own account by clicking on the "Free Registration" button below. In case you have any further questions about the web application TRICK Service, don't hesitate to contact us on email@example.com or by calling us under the following number: +352 26 17 62 12
If you run a small or medium sized business and want to have a basic security check at reasonable cost, then itrust consulting's new vulnerability test offer might interest you.
Our malware.lu CERT team is currently offering a basic vulnerability test package at a fairly low price that will give small to medium sized businesses the opportunity to get a first impression of their security situation. More precisely, we offer an automated scanning service at the price of only 200€.
Hackers are out there lurking for your data. Don't leave yourself unprepared!
The entire team of itrust consulting joins in sending warm Christmas wishes for the end of the year period.
Carlo, Matthieu, Benoît, Alex, Sam, Ben, Guillaume, Ensuifudine, Rémi, Marieta, Gonzalo, Bernard, Steve, Cédric, Nikolaos, Ingo, Michel, Gazmend, Sankalp and Jean say thank you for your support and partnership and are looking forward to further opportunities to work together.
As in previous years, we are using our end-of-year budget to support two welfare projects. This year Caritas and Croix-Rouge.
The bIoTope project’s aim is to create the conditions under which the Internet of Things (IoT) can become a true marketplace for the creation and consumption of innovative services within and across platforms and/or sectors. For this vision to be realised, IoT data must be easy to discover, understand and safely combine across typical vendor lock-in platforms (also referred to as “Vertical Silos"). It must also be possible to securely and fairly monetise any IoT-built service within this API economy marketplace. The role of itrust consulting as a partner within the bIoTope consortium is to provide guidance in the latter task.
Find the complete article on pages 26-29 in the latest edition of the cahier scientifique from revue technique about the collaboration of itrust consulting and university of Luxembourg in the bIoTope by clicking the button "Article" bellow.
On October 18th, Steve Muller did a presentation at the 4th International Workshop on Risk Assessment and Risk-driven Quality Assurance in Graz, Austria.
He presented the ADTop tool, developed by itrust consulting during their TREsPASS project. This project aims at determining the 'best' set of security controls that are able to minimize the potential risks all by keeping the costs of the advised countermeasures low.
From October 10th to 12th 2016 the International Conference on Critical Information Infrastructure Security (CRITIS) took place in Paris, France.
Representing itrust consulting on this event, Steve Muller held a speech on October 11th on how interdependencies in complex computer systems can be modelled to take all cascading effects into account. A risk assessment conducted on the smart grid in Luxembourg served as illustration for the presentation.
On the eve of 20th September, the source code of the Mirai botnet responsible for one of the biggest known cyber-attacks originating and targeting IoT (Internet of Things) devices was released. IoT devices are interconnecting physical devices such as webcams, thermostats, sensors, and other devices that collect and exchange data and can be controlled by end-users over a network. The Mirai botnet has recently been used to deploy a DDoS (Distributed denial-of-service) attack generating 620 Gbps of traffic against the website of the famous American journalist Brian Krebs.
It is particularly noticeable that despite the huge amount of generated traffic, the attack did not rely on any amplifier, but rather used the IoT devices as entry points for these attacks. According to forecasts, there will be as many as 6.4 billion IoT devices connected to the internet in 2016, and this number is expected to reach 20.7 billion by 2020. These staggering figures combined with the release of the botnet source code, poses a critical threat for the existing IoT infrastructure in the industry, as well as for end-users.
As a part of the H2020 framework, the biotope project aims to provide an ecosystem for such smart devices which will also address the security aspect of such devices. itrust consulting plays a leading role in developing the security toolkit that will protect such smart devices against potential cyber-attacks. Such toolkit will seamlessly integrate within the framework of the biotope project providing a complete and secure System-of-System platform for IoT devices.
itrust consulting’s SECaaS addresses IT Security Outsourcing defined as top priority in the recently published statistical data on IT Outsourcing Statistics 2016/2017 by Computer Economics.
itrust consulting is successfully active in this domain for several years now, even before it has been identified as a market trend on the Information Security sector. Meanwhile itrust consulting is recognised by its private and public customers as reliable partner for Security Outsourcing, next to the other services offered, as Audit and Ethical Hacking, Malware Analysis, Research & Development Security Consultancy, Training and Awareness.