We are the bodyguards for your bits and bytes.
We are not just any IT security consulting company. We are the nerds who will protect you from digital villains. Our method is simple: we think like hackers and use the same methods to make your organization safe and robust against attacks. We think unorthodoxly and outside the box in order to find creative solutions.
What's more, we're a friendly bunch and we don't have a know-it-all attitude – we don't give condescending lectures, but real, tangible assistance. We take your IT security to the next level.
The crew
During the day, I check the security of companies. In the evening, I grab my lockpick set next to the stream and get started. I'm happy to help uncover weaknesses in a Red Team deployment and give tips for improvement.
Whether it's 00:42 or 13:37 – both can be my working hours, because I support companies that are threatened with damage running into millions. Every second counts and I can be on site quickly. Always on the lookout for malware in terabytes of data: certifications such as CHFI, eCDFP.
I enjoy getting people up to speed in the field of IT security. Some teams need a nudge to systematically detect threats. Developers are often amazed at how easily their code can be attacked – and when I show them where the problem lies, there's that “aha!” feeling.
After coordination, I carry out realistic corporate attacks. I try to overcome access restrictions (IT/OT or physical). This can also involve breaking into the server room to test physical security and how to deal with social engineering attacks.
Cloud environments are complex and I understand that many people are overwhelmed by the configuration options. In cloud environments, I look for the needle in the haystack - the small misconfiguration that has a major impact on IT security.
A diverse IT security team is like a multifunctional toolbox: it offers customized solutions for every trick and trickery of cyber criminals.
Christian
You don't like 0815? Neither do I. I don't use email templates for my phishing campaigns. That would be too simple and boring. I create a realistic scenario for my clients to determine the awareness of their employees with regard to targeted (spear) phishing campaigns.
For me, IT security is more than just a tech check. For me, it only works with people who understand and live the processes behind it. I find it exciting to immerse myself in customer environments, to help customers see their IT as a whole and to improve processes.
COBOL, JS, ABAP, SSDLC are more than just acronyms for me. With several years in software development and code review, I know the game and the problems from the technical and organizational side. Need a look at your code or support with your SSDLC? Just let me know!
codecentric is ISO 27001 certified and has undergone a TISAX assessment
ISO 27001 certification confirms that we have an effective information security management system (ISMS) that helps us to keep our systems and IT processes available and to ensure the confidentiality of information.
Due to the increased information security requirements in the automotive industry, we have also established the industry-specific TISAX (Trusted Information Security Assessment Exchange) standard. The ENX Association supports the mutual recognition of information security audits in the automotive industry through TISAX on behalf of the VDA.
Networking & communities
Sharing knowledge is part of our DNA, as is continuous learning and exchanging ideas with people who care about IT security at least as much as we do.
Contact
Are you wondering if you already have any uninvited guests? Have you lost the thread and wish to know where your business stands in terms of security? Do you wish to know whether you have developed in a safe way? Or do you wish to join us in doing real IT security?
Then just talk to me.
Business Development Manager
The Pentester
I am passionate about attacking all kinds of systems such as websites, infrastructures, mobile apps and more. When I'm not looking for vulnerabilities, you can find me on HackTheBox or at technical hacking training courses such as OSCP. Let me see how secure your IT is ;-).