to manage information (potentially including PII) according to contracts (consulting, audit, training, research…);
to learn from past experience in our projects for upcoming projects (knowledge management), or to train new staff;
to carry out contracts including invoicing and justification of work performed (e.g. with timesheets and progress reports);
to manage IT activities with the aim of information security (including service availability), and to detect and handle threats, vulnerabilities, risks, and incidents;
to manage employment contracts, to ensure workplace safety, and to manage application information;
to demonstrate consistency of our accounting system to tax authorities and interested parties;
to perform forensic analysis and propose effective reactions to security events, to detect frauds and vulnerabilities, to understand malware and malware producers, and to share this knowledge with other security experts fighting against cybercrime;
trace the validity of our reports and advice for justifying professionalism.
To apply your rights for access, correction, reporting misuse, or withdrawing consent, please send an email to firstname.lastname@example.org.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
We use the following third party services:
Google Maps is used on the contact page of our website.
Google reCAPTCHA is used to protect our forms.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses the following additional cookies from matomo.itrust.lu:
Please enable Strictly Necessary Cookies first so that we can save your preferences!
Ben Fetler presented a scientific paper entitled "Information Security Maturity as an Integral Part of ISMS based Risk Management Tools" (Authors: Ben Fetler, Carlo Harpes), during the tenth international conference on emerging security information, systems and technologies - SECURWARE 2016 in Nice, France.
Gadyatskaya O., Harpes C., Mauw S., Muller C., Muller S. (2016) Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. In: Kordy B., Ekstedt M., Kim D. (eds) Graphical Models for Security. GraMSec 2016. Lecture Notes in Computer Science, vol 9987. Springer, Cham.
itrust consulting is proud to announce that the project DIAMONDS, co-funded by the Ministry of Economy and coordinated by Fraunhofer FOKUS, Berlin, has received the EUREKA Innovation award 2015/2016 for added value. The 300k€ investment at itrust consulting allowed us to create a pentesting platform TRICK tester, a reverse engineering open-source tool called malwasm, the portal avcaesar.malware.lu sharing information on malware, a maturity model for risk assessment and treatment, etc. It finally helps to set up the first private CERT in Luxembourg, malware.lu CERT, and offers pentesting services, which creates essential added value for itrust consulting.
Carlo Harpes, managing director of itrust consulting, assisted to the kick-off meeting of bIoTope, an EU funded H2020 project. itrust consulting is involved to specify and develop security services for the Internet of Things (IoT), together with the University of Luxembourg and other partners. In particular, itrust consulting will support SmartCity and SmartHome pilots in Brussel, Lyon and Helsinki.
On invitation by the Lycée Ermesinde in Mersch, C. Harpes participated to a brainstorming together with teachers and students, on the evolution of Information and Communication Technologies (ICT) and the expectation of the sector toward the school system.
For C. Harpes, the ICT sector offers more opportunities than just programming. The use of ICT and new media should be part of any school subject, particularly languages. Basic concepts like firewalls, geolocation, cloud, software installation, and protection of personal data should already be taught to the youngest pupils at secondary schools, as a large majority of our population uses such technologies without fully understanding them or even roughly knowing the related risks and opportunities.
Finally, the very open discussion highlighted that the essential skill required in this sector is the motivation and perseverance in problem solving. Wrongly considered as a predominantly male occupation, the increasing requirement for excellent communication skills should make this sector equally attractive for female candidates.