-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.xml
More file actions
106 lines (85 loc) · 7.68 KB
/
index.xml
File metadata and controls
106 lines (85 loc) · 7.68 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Delta Sec</title>
<link>https://dstergiou.github.io/</link>
<description>Recent content on Delta Sec</description>
<generator>Hugo -- gohugo.io</generator>
<language>en-us</language>
<lastBuildDate>Sun, 28 Jan 2018 00:00:00 +0000</lastBuildDate>
<atom:link href="https://dstergiou.github.io/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Information Security</title>
<link>https://dstergiou.github.io/services/infosec/</link>
<pubDate>Sun, 28 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/infosec/</guid>
<description>Information security is a set of strategies for managing the processes, tools, people and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Although information security used to be considered the job of IT, it has reached a state where it covers the whole organization and it&rsquo;s an integral part of any Enterprise Risk Management (ERM) framework.
Strategic information security We can assist with:</description>
</item>
<item>
<title>Privacy</title>
<link>https://dstergiou.github.io/services/privacy/</link>
<pubDate>Sat, 27 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/privacy/</guid>
<description>The Personal Data Act and EU’s forthcoming General Data Protection Regulation (GDPR) define that organizations have an obligation to protect personal information against unauthorized use.
We help you to protect your data; in use, in transit or at rest. Whether you gather data directly from the data subjects or indirectly you must do it in a transparent and privacy ensuring way. When analyzing the collected data, whether on-premise or in cloud, you need to ensure only correct parties have access to it and the results.</description>
</item>
<item>
<title>Vulnerability assessment / Penetration testing</title>
<link>https://dstergiou.github.io/services/vulnerability/</link>
<pubDate>Fri, 26 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/vulnerability/</guid>
<description>Vulnerability assessment The Vulnerability Assessment Service is a service to identify technical vulnerabilities in existing IT environments. The purpose is to reduce the risk of intrusion or accidental damage that may affect or damage your operations.
By the use of a world-leading technology, we provide our customers with a clear view of how they can easily protect their IT environment, thereby minimizing financial, legal and operational risks and potential damage to the brand.</description>
</item>
<item>
<title>Secure Application Development (SDLC)</title>
<link>https://dstergiou.github.io/services/sdlc/</link>
<pubDate>Thu, 25 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/sdlc/</guid>
<description>The earlier a security bug is discovered in the development lifecycle, the lesser the cost will be to remedy the bug. This may sound like a cliché, but we have seen it happening multiple times. And if you don&rsquo;t believe us, believe all the research that been done on the idea of defect cost curve.
By introducing an SDLC (Software Development Lifecycle) into your development processes you ensure that a number of key activities are performed at the appropriate time - activities that can lead to more secure systems and less cost for keeping them secure.</description>
</item>
<item>
<title>iGaming Security Services</title>
<link>https://dstergiou.github.io/services/igaming/</link>
<pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/igaming/</guid>
<description>We realize that the iGaming world has rigorous certifications that can only be undertaken by authorized and (sometimes) pre-approved testing agencies (labs). If this is what you are looking for, we can&rsquo;t help you - not today at least.
But if you are looking for someone to help you prepare your organization before applying for a gaming license, or you are looking for someone to help you set up your management system in a way that the testing agencies will find suitable, then look no further.</description>
</item>
<item>
<title>Outsource Evaluation</title>
<link>https://dstergiou.github.io/services/outsource/</link>
<pubDate>Tue, 23 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/outsource/</guid>
<description>Outsourcing has become a big part of business nowadays. Organizations choose to outsource their infrastructure, their services or even their human resources. Outsourcing brings convenience, but also relinquishes control to the 3rd party.
In many cases the organization can rely on the fact that the outsourcing provider is proficient in what they do - Amazon Web Service, Google Cloud or Microsoft Azure. But in other cases, the organization might be need to contract with a less-known vendor (for financial, regulatory or other reasons).</description>
</item>
<item>
<title>Cyber Awareness Training</title>
<link>https://dstergiou.github.io/services/training/</link>
<pubDate>Mon, 22 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/training/</guid>
<description>Social engineering attacks such as phishing, spear phishing and voice phishing (vishing) are becoming the most popular methods for an attacker to get a foothold in an organization. Considering that these attacks are easy to execute and pose minimum danger for the attacker, it&rsquo;s no question that your organization will have to defend against them successfully if you want to maintain a secure environment.
What we can help you with:</description>
</item>
<item>
<title>Conferences and Speaking Engagements</title>
<link>https://dstergiou.github.io/services/conference/</link>
<pubDate>Sun, 21 Jan 2018 00:00:00 +0000</pubDate>
<guid>https://dstergiou.github.io/services/conference/</guid>
<description>If you are looking for a speaker for your next conference, then we can help you by providing an interesting and engaging talk. Our main passions are:
Cyber Capabilities Maturity Models Secure Software Development and SDLC Social Engineering You can also use our services for panel participation or panel moderation, provided that the panel is addressing topics in the areas that we offer services in. We even love to talk about iGaming, but only about the regulatory side of things - we are not experts in what makes games attractive!</description>
</item>
<item>
<title>About Delta Sec</title>
<link>https://dstergiou.github.io/company/about/</link>
<pubDate>Tue, 31 Oct 2017 21:28:43 -0500</pubDate>
<guid>https://dstergiou.github.io/company/about/</guid>
<description>Delta Sec is a consulting company that offers services in the areas of Information Security, Privacy and Security Awareness Training.
The company was established by Dimitrios Stergiou who has over 20 years of experience in roles that cover IT Security, Information Security, Privacy and Awareness Training. Dimitrios has held roles such as:
Information Security Engineer Information Security Consultant Information Security Manager Chief Information Security Officer Dimitrios currently holds the following certifications:</description>
</item>
</channel>
</rss>