Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training in the fields of technical cybersecurity, strategy and information assurance, information and situational awareness, protective security and cyber defence. The company primarily has its roots in engineering, telecommunications and defence/military, where all of its employees are senior professionals averaging twenty years of domain experience.
Sectyne has significant experience from industries and verticals such as Energy, Aviation, Logistics, Telecommunications, Finance, and Defence/Military.
Sectyne became a member of the Swedish Security and Defense Industry Association in August 2019, where we take part in the cyber working group.
Sectyne is a member of the Security Delegation (NSD) at the Confederation of Swedish Enterprise, where we are engaged in cybersecurity work for private sector.
Sectyne participates in the Swedish node for accelerating innovation and research in cybersecurity. Being a member, Sectyne contributes in various projects outlining different research proposals and initiatives.
In 2021 Sectyne received the UC Gold designation / Risk Category 5, meaning that we have the highest credit rating possible. The rating indicates that we are financially trustworthly, having our finances in order.
The services and advisory that Sectyne offers can
be grouped into the following main categories:
Secure your infrastructure: Present day security is often based on point solutions, but they do not fully address the ever-evolving threat environment.
Cybersecurity requires aligned operational IT-security management, where Sectyne provides technical expertise to its clients, ranging from access control, logging and security assessments to secure development practices, malware defenses and incident response.
Focus on what matters most: Risk-based insight and action-oriented recommendations that enable success and resilience.
We have a holistic and information-centric view. Sectyne helps some of its clients in developing cyber security strategies to facilitate secure digitization as well as implementing successful information assurance and security programs.
All organizations benefit from accurate information in order to build situational awareness as well as to make information actionable.
We help our clients to organize, structure and increase their information management capabilities where we also provide analytic services and training.
Securing national security information and critical infrastructure while being able to detect and counteract threats in cyberspace are crucial capabilities for governments.
Sectyne provides national security advisory, executive training and cyberspace operations expertise for governments, their agencies as well as organizations that operate critical infrastructure.
Systems and critical information locked down by ransomware. A former employee gains access to sensitive company information before leaving. A qualified state-sponsored threat actor is suspected of having penetrated a network. We've investigated all of the above.
Sectyne brings extensive experience in investigation and digital forensics to the table where we have the capabilities to either lead your investigation, or, support your incident response team with additional skills.
CSFI is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners.
Learn More about CSFI
Introduction to Cyber Warfare and Operations Design (2 days)
This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, as well as planning, organizing, and integrating cyberspace operations. The course will consist of presentations and exercises that will teach you how to develop a cyber-operations design and bring it to fruition. At the conclusion of the course, you will have a fundamental understanding of how to analyze, plan for, and execute cyberspace operations.
Defensive Cyber Operations Engineer (3 days)
In this course, students will acquire the skills for the planning, executing, and integrating defensive cyberspace operations (DCO) into organizational missions and DCO requirements. The course builds on the planning skills learned in the Introduction to Cyber Warfare and Operations Design (ICWOD) course. Adversarial use of tools and their associated techniques are presented to assess network vulnerabilities and to defend friendly networks against adversary threats.
The course covers the use of open source tools and websites for system configuration, penetration testing, and control testing. You will use Linux and Windows command lines and unleash an attack on target servers and analyze the results. Attacks and analysis of will expose you to live attacks in a controlled environment where students can see first-hand the adversary realm of possible actions, how to detect, mitigate, and counter such activities.
Certified Collections Analyst (3 days)
This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cyber security threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cyber security efforts, and use collection activities to support decision making within organizational tiers.
Certified SCADA Cyber Operations Engineer (5 days)
This course provides you with a thorough understanding of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) devices and their inner workings. You will learn how to execute cyber missions in which a SCADA environment is part of the greater cyberspace operational environment. By performing incident response on SCADA devices, you will learn in-depth concepts about SCADA devices.
Radicalization and Counter/Cyber Jihadist Operations Analyst (1 day)
A professional and academic discourse around radicalization with the intent to disrupt, isolate, and dismantle terrorist organizations. Some of the things you'll learn is how religious extremists use social media and social networks to recruit, the do's and do not's of government (including military) response to recruiting by religious extremists and how to read social media profiles of potential targets to understand the human terrain.
Sectyne and CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course.
Sectyne is present in the following locations:
5506 Linden st
Dublin, CA 94568
℅ The Cyber Security Forum Initiative
9720 Capital Court, Suite 200, Manassas, VA 20110
Paul de Souza (POC)
PGP key is available upon request