RALFKAIROS

Pentest, audit & training
OUR OFFERCONTACT US

Welcome

We help our clients get the most out of their business processes, internal control and risk management environments through an optimal use of information and technology.

Based in Seoul and Paris, we provide vendorindependent, hands-on, quality assurance and consulting cybersecurity services.
We believe the information system is a lever upon which organizations should further base their digital transformation.

Our favorite angles? traditional control mechanism, system architecture analysis and improved data asset management.

Why RALFKAIROS ?

◊ Our IT reviews identify your potential vulnerabilities and areas for improvement and propose a confidential and efficient for your website, application or IT system.

We make sure to suggest an action plan. You end up with a more secure IT environment, aligned with your business strategy, compliant with local regulations.

◊ We help you define your KPI security dashboard. You have a comprehensive CISO view on your organization.

◊ We provide assistance to your IT initiatives – corporate or local. You meet the targets on time within budget.

◊ We organize a tailored security training for your staff in Asia. You lower your company risk of intrusion using the best ISO framework, in Korean or English language with our certified professional trainers.

◊ We draft your disaster/intrusion recovery plan and your business continuity plan. You are prepared for forthcoming breaches.

years as IT security & audit background

IT expertise domains

IT CERTIFICATIONS

Users PROTECTED SIMULTANEOUSLY

Service Plan

Starter Audit

  • Process Review
  • Organisation Review
  • IT Review
  • Action Plan

Estimated charge : 3 to 5 days 

INTERMEDIATE Audit
  • Process Review
  • Organisation Review
  • IT System Audit
  • Action Plan
  • Security Training

Estimated charge : 5 to 15 days 

Penetration tests

  • 5Test your application security
  • Identify CVE, CVSS
  • Wrap-up report for vulnerabilities identified
  • Reassure that their sensitive data is well defended

Estimated charge : 5 to 10 days

Critical data
identification
 

APT
hardening
 

Threat
analysis
 

Identification
& remediation

KPI CISO
reporting
 

Processus
updating

Policy
enforcement
 

Security
awareness
training

Compliance
Action plan
 

Third-party
contract

review

REFERENCES

ARE YOU WELL DEFENDED ?

Marc - 10 Questions For auto-assessing your cybersecurity

based on best practices, norms and companies use cases experience, this survey could help executives or managers to verify that their Minimum Valuable Security Baseline is reached on their information system.

CERTIFICATIONS

Last events gallery

we are regulary invited as speakers for cybersecurity conferences in Asia. Contact us to participate to our events or speak at your next seminar.