itrust consulting proudly announces the release of a new version of its risk assessment and treatment web application TRICK Service.
TRICK Service is an easy to use application designed to:
perform risk management following ISO 31000, ISO/IEC 27005, and ISO/IEC 27001;
support quantitatively AND qualitative risk estimation;
prepare data protection impact assessments (DPIA): TRICK Service enables to perform impact assessments in compliance with the European Union General Data Protection Regulation.
TRICK Service is composed of many advanced and useful features such as multi-user support, access control, automatic creation of risk analysis reports, risk analysis versioning, visualisation of risk evolution, definition of risk profiles. Furthermore the user has the option to embed his own security control catalogues or international standards adapted to its requirements.
In order to get your 30 days free access rights to our TRICK Service demo verison, feel free to create your own account by clicking on the "Free Registration" button below. In case you have any further questions about the web application TRICK Service, don't hesitate to contact us on email@example.com or by calling us under the following number: +352 26 17 62 12
If you run a small or medium sized business and want to have a basic security check at reasonable cost, then itrust consulting's new vulnerability test offer might interest you.
Our malware.lu CERT team is currently offering a basic vulnerability test package at a fairly low price that will give small to medium sized businesses the opportunity to get a first impression of their security situation. More precisely, we offer an automated scanning service at the price of only 200€.
Hackers are out there lurking for your data. Don't leave yourself unprepared!
The entire team of itrust consulting joins in sending warm Christmas wishes for the end of the year period.
Carlo, Matthieu, Benoît, Alex, Sam, Ben, Guillaume, Ensuifudine, Rémi, Marieta, Gonzalo, Bernard, Steve, Cédric, Nikolaos, Ingo, Michel, Gazmend, Sankalp and Jean say thank you for your support and partnership and are looking forward to further opportunities to work together.
As in previous years, we are using our end-of-year budget to support two welfare projects. This year Caritas and Croix-Rouge.
The bIoTope project’s aim is to create the conditions under which the Internet of Things (IoT) can become a true marketplace for the creation and consumption of innovative services within and across platforms and/or sectors. For this vision to be realised, IoT data must be easy to discover, understand and safely combine across typical vendor lock-in platforms (also referred to as “Vertical Silos"). It must also be possible to securely and fairly monetise any IoT-built service within this API economy marketplace. The role of itrust consulting as a partner within the bIoTope consortium is to provide guidance in the latter task.
Find the complete article on pages 26-29 in the latest edition of the cahier scientifique from revue technique about the collaboration of itrust consulting and university of Luxembourg in the bIoTope by clicking the button "Article" bellow.
On October 18th, Steve Muller did a presentation at the 4th International Workshop on Risk Assessment and Risk-driven Quality Assurance in Graz, Austria.
He presented the ADTop tool, developed by itrust consulting during their TREsPASS project. This project aims at determining the 'best' set of security controls that are able to minimize the potential risks all by keeping the costs of the advised countermeasures low.
From October 10th to 12th 2016 the International Conference on Critical Information Infrastructure Security (CRITIS) took place in Paris, France.
Representing itrust consulting on this event, Steve Muller held a speech on October 11th on how interdependencies in complex computer systems can be modelled to take all cascading effects into account. A risk assessment conducted on the smart grid in Luxembourg served as illustration for the presentation.
On the eve of 20th September, the source code of the Mirai botnet responsible for one of the biggest known cyber-attacks originating and targeting IoT (Internet of Things) devices was released. IoT devices are interconnecting physical devices such as webcams, thermostats, sensors, and other devices that collect and exchange data and can be controlled by end-users over a network. The Mirai botnet has recently been used to deploy a DDoS (Distributed denial-of-service) attack generating 620 Gbps of traffic against the website of the famous American journalist Brian Krebs.
It is particularly noticeable that despite the huge amount of generated traffic, the attack did not rely on any amplifier, but rather used the IoT devices as entry points for these attacks. According to forecasts, there will be as many as 6.4 billion IoT devices connected to the internet in 2016, and this number is expected to reach 20.7 billion by 2020. These staggering figures combined with the release of the botnet source code, poses a critical threat for the existing IoT infrastructure in the industry, as well as for end-users.
As a part of the H2020 framework, the biotope project aims to provide an ecosystem for such smart devices which will also address the security aspect of such devices. itrust consulting plays a leading role in developing the security toolkit that will protect such smart devices against potential cyber-attacks. Such toolkit will seamlessly integrate within the framework of the biotope project providing a complete and secure System-of-System platform for IoT devices.
itrust consulting’s SECaaS addresses IT Security Outsourcing defined as top priority in the recently published statistical data on IT Outsourcing Statistics 2016/2017 by Computer Economics.
itrust consulting is successfully active in this domain for several years now, even before it has been identified as a market trend on the Information Security sector. Meanwhile itrust consulting is recognised by its private and public customers as reliable partner for Security Outsourcing, next to the other services offered, as Audit and Ethical Hacking, Malware Analysis, Research & Development Security Consultancy, Training and Awareness.
Ben Fetler presented a scientific paper entitled "Information Security Maturity as an Integral Part of ISMS based Risk Management Tools" (Authors: Ben Fetler, Carlo Harpes), during the tenth international conference on emerging security information, systems and technologies - SECURWARE 2016 in Nice, France.
Gadyatskaya O., Harpes C., Mauw S., Muller C., Muller S.
(2016) Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
In: Kordy B., Ekstedt M., Kim D. (eds) Graphical Models for Security.
GraMSec 2016. Lecture Notes in Computer Science, vol 9987. Springer, Cham.