<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Case Studies Archives - 3Cyber-Sec</title>
	<atom:link href="https://3cyber-sec.com/category/case-studies/feed/" rel="self" type="application/rss+xml" />
	<link>https://3cyber-sec.com/category/case-studies/</link>
	<description>Cyber Security</description>
	<lastBuildDate>Wed, 05 Jan 2022 09:18:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://3cyber-sec.com/wp-content/uploads/2021/05/cropped-profile_custom-32x32.png</url>
	<title>Case Studies Archives - 3Cyber-Sec</title>
	<link>https://3cyber-sec.com/category/case-studies/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Case Study: How 3Cyber-Sec helped Paynetics – Phos Services Ltd. obtain PCI DSS and PCI CPoC standards?</title>
		<link>https://3cyber-sec.com/2021/12/15/how-3cyber-sec-helped-paynetics-phos-services/</link>
					<comments>https://3cyber-sec.com/2021/12/15/how-3cyber-sec-helped-paynetics-phos-services/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 09:06:44 +0000</pubDate>
				<category><![CDATA[Case Studies]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1319</guid>

					<description><![CDATA[<p>Obtaining PCI DSS and PCI CPoC was essential for Phos Services Ltd. We helped the company cover the needed requirements and achieve compliance.</p>
<p>The post <a href="https://3cyber-sec.com/2021/12/15/how-3cyber-sec-helped-paynetics-phos-services/">Case Study: How 3Cyber-Sec helped Paynetics – Phos Services Ltd. obtain PCI DSS and PCI CPoC standards?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">We are very happy when we have the chance to partner with passionate professionals in their field of work. Such was our experience with Paynetics – Phos Services Ltd. Representatives of the company contacted us back in the middle of August 2020 after we were recommended to them by another satisfied client. </span></p>
<p><span style="font-weight: 400;">Phos Services ltd. is a company established in the United Kingdom that develops innovative, game-changing technologies. Their solutions allow merchants to accept card payments directly on their NFC-enabled Android devices, either smartphones or tablets. The company also integrates a variety of business applications for merchants like: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">marketing;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">loyalty programs; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">payroll;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">data-driven e-commerce tools.</span></li>
</ul>
<p><span style="font-weight: 400;">Since it was founded in 2018, it shows rapid growth and innovative development. </span></p>
<h2><span style="font-weight: 400;">Phos Services Ltd.’s challenge</span></h2>
<p><span style="font-weight: 400;">The company contacted 3Cyber-Sec because they needed specific help with one of their PCI certifications. They wanted to be able to meet all the requirements of the standard to be able to develop their mobile payment application in line with the industry security standards, ensuring they can securely accept payments by card on a mobile phone. The essential needs of the client were to:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ensure cybersecurity throughout the development of innovative payment technologies;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Comply with industry regulations;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Obtain certification for the international standards PCI DSS and PCI CPoC;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Gain comprehensive cyber risk visibility.</span></li>
</ul>
<h2><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-1321" src="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-13.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-13.png 1200w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-13-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-13-480x252.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></h2>
<h2><span style="font-weight: 400;">3Cyber-Sec’s Solution </span></h2>
<p><span style="font-weight: 400;">We approached this task having extensive knowledge that can solve this specific case and offered our consultancy services for PCI CPOC requirements. There were some challenges within the project like the short deadlines and the fact that we had only remote access and contact with the Dev team. </span></p>
<p><span style="font-weight: 400;">The extreme conditions and the limited time could not alter in any way effectiveness. We adopted a tailor-made approach to adequately address the situation. First, we began examining what has been done until the point we started working on the project. Then we analyzed the inconsistencies of the mobile application developed by our client related to the standard. Next, we correlated them to each of the requirements of the standard and wrote recommendations for compliance that the client should follow. </span></p>
<p><span style="font-weight: 400;">With the support and active involvement of the management team, everything was done in time for achieving compliance. This is how we successfully supported Phos Services Ltd in solving their PCI DSS and PCI CPoC’s certifications.</span></p>
<p><i><span style="font-weight: 400;">“3Cyber-Sec is a greatly valued partner for Phos Services ltd. Throughout the development of our software POS, we were required to push the boundaries of FinTech cloud infrastructure and 3Cyber-Sec’s expertise has been critical in ensuring that we adhere to the highest standards of security at all times. Furthermore, 3Cyber-Sec’s team has guided us towards reaching the highest degree of payment security by helping us meet the requirements and obtain certification for the international standards PCI DSS and PCI CPoC. Additionally, 3Cyber-Sec’s vCISO service has enabled us to gain a better understanding of the cyber risks our company could be exposed to by portraying a comprehensive picture of our board-level behavior.” &#8211; </span></i><span style="font-weight: 400;">Chief Technology Officer, Phos Services ltd. </span></p>
<h2><span style="font-weight: 400;">The outcome</span></h2>
<p><span style="font-weight: 400;">With our help and recommendations, the client was able to further develop its application to a degree ready for certification tests. Also, this helped Phos Services be one of the first companies in the world to offer such a service.</span></p>
<p><span style="font-weight: 400;">When we started working on the project, the mobile application was not in line with the requirements of the PCI CPOC standard. In just 2 months we were able to navigate them in accordance with the exact requirements regarding InfoSec. With our work, we may have helped them shorten the time invested by almost a year. </span></p>
<p><b><i>“We strongly appreciate 3Cyber-Sec’s consultants’ knowledge and proficient approach, as well as their ability to effectively translate technical security issues to business-driven top management.“ </i></b><span style="font-weight: 400;">&#8211; Chief Technology Officer, Phos Services ltd.</span></p>
<p>The post <a href="https://3cyber-sec.com/2021/12/15/how-3cyber-sec-helped-paynetics-phos-services/">Case Study: How 3Cyber-Sec helped Paynetics – Phos Services Ltd. obtain PCI DSS and PCI CPoC standards?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/12/15/how-3cyber-sec-helped-paynetics-phos-services/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Case Study: How 3Cyber-Sec conducted web service penetration tests and security source code review for ZigZag Global</title>
		<link>https://3cyber-sec.com/2021/12/02/case-study-for-zigzag-global/</link>
					<comments>https://3cyber-sec.com/2021/12/02/case-study-for-zigzag-global/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 08:38:31 +0000</pubDate>
				<category><![CDATA[Case Studies]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1282</guid>

					<description><![CDATA[<p>For us, it was quite a compliment when ZigZag Global reached out to us at the end of August 2021 with a request for regular cybersecurity checks/penetration testing of their primary system. </p>
<p>The post <a href="https://3cyber-sec.com/2021/12/02/case-study-for-zigzag-global/">Case Study: How 3Cyber-Sec conducted web service penetration tests and security source code review for ZigZag Global</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.zigzag.global/"><span style="font-weight: 400;">ZigZag Global</span></a><span style="font-weight: 400;"> is one of the recognizable names in the e-commerce industry and one of the leaders in its specific niche &#8211; returning products and goods. The company works globally and helps retailers manage their returns thanks to 320 000 different drop-off locations, 450 international carrier services, and 220 warehouses in 135 countries.</span></p>
<p><span style="font-weight: 400;">The company is positioned on the biggest marketplaces and works with prominent tech and </span><a href="https://www.zigzag.global/technologypartners/"><span style="font-weight: 400;">strategic partners</span></a><span style="font-weight: 400;"> like Zendesk, Microsoft Dynamics, EON, Aramex Delivery Unlimited, API2CART, Honeywell, and more. </span></p>
<p><span style="font-weight: 400;">For us, it was quite a compliment when ZigZag Global reached out to us at the end of August 2021 with a request for regular cybersecurity checks/penetration testing of their primary system. </span></p>
<h2><span style="font-weight: 400;">ZigZag Global’s challenge</span></h2>
<p><span style="font-weight: 400;">ZigZag Global had to carry out a cybersecurity checking of their system. That was a preventive measure but was also a requirement by one of their primary clients. The company got in touch with 3Cyber-Sec after they received a recommendation about the quality of our services. </span></p>
<p><span style="font-weight: 400;">The client (ZigZag Global) needed penetration testing services of their API infrastructure and security source code review of the back-end system. During the process, the team of 3Cyber-Sec checked over 30 000 lines of source code. “When ZigZag contacted us, they knew that we had the expertise and capacity to carry out such extensive and in-depth research in their system.” &#8211; shares Todor Kunev, Board advisor of 3Cyber-Sec.</span></p>
<h2><span style="font-weight: 400;">3Cyber-Sec’s Solution </span></h2>
<p><span style="font-weight: 400;">Together with internal teams from Zig Zag, we built a custom action plan and completed the following sequence of activities: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"> We studied in detail the description of the systems’ environment and infrastructure provided by ZigZag Global; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"> Build a test environment, which was a copy of the production environment. That was the place where we performed the penetration testing; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Actively conducted offline source code review and tested the API and microservice infrastructure of the company;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prepared and submitted two different reports about our findings;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Presented the results to the CTO and head of IT Infrastructure at ZigZag Global. </span></li>
</ul>
<p><span style="font-weight: 400;">The biggest challenge in this project was the security source code review due to the large volume of the code we had to go through. Everything went smoothly thanks to the great cooperation of the team of ZigZag Global. </span></p>
<p><img decoding="async" class="alignnone size-full wp-image-1284" src="https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-11.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-11.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-11-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-11-480x252.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">The outcome  </span></h2>
<p><span style="font-weight: 400;">During our work, we found out something that had the potential to put in jeopardy the whole business of our client. We located a new vector for an attack that could affect the whole operation of ZigZag Global. Due to the scope of the potential threat, the client took immediate measures and this vulnerability was remediated. We also found several bad practices in the code of the microservice infrastructure that was dealt with. </span></p>
<p><span style="font-weight: 400;">Thanks to 3Cyber-Sec a vulnerability that could be exploited by hackers was found and mitigated. If this wasn’t done, sooner or later hackers would probably reach the same vector of attack that we reached. If you also need help with your cybersecurity, feel free to </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">get in touch with us</span></a><span style="font-weight: 400;">. We will be happy to help. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/12/02/case-study-for-zigzag-global/">Case Study: How 3Cyber-Sec conducted web service penetration tests and security source code review for ZigZag Global</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/12/02/case-study-for-zigzag-global/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Case Study: How Fraport Twin Star Airport Management achieved compliance for important national standard</title>
		<link>https://3cyber-sec.com/2021/10/19/case-study-fraport-airport-management/</link>
					<comments>https://3cyber-sec.com/2021/10/19/case-study-fraport-airport-management/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Tue, 19 Oct 2021 06:53:23 +0000</pubDate>
				<category><![CDATA[Case Studies]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1243</guid>

					<description><![CDATA[<p>3Cyber-Sec managed to provide visibility to the vulnerabilities in cybersecurity that “Fraport Twin Star Airport Management” AD was not aware of and managed to help the client cover the requirements of the regulation and achieve compliance.</p>
<p>The post <a href="https://3cyber-sec.com/2021/10/19/case-study-fraport-airport-management/">Case Study: How Fraport Twin Star Airport Management achieved compliance for important national standard</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">“Fraport Twin Star Airport Management” AD is the German-Bulgarian concessionaire of Burgas Airport and Varna Airport, 60% owned by the global airport operator Fraport AG and 40% held by “Airport Services Bulgaria“. Since 2006, the company manages and develops both Black Sea airports under a 35-year concession granted by the Bulgarian State.</span></p>
<p><span style="font-weight: 400;">One of the values of the company is its constant striving for perfection. The company always sets new high goals to be achieved. That same principle was applied in the field of cybersecurity as well when “Fraport Twin Star Airport Management” had to meet the national regulatory requirement for network and information security. </span></p>
<p><span style="font-weight: 400;">For companies in this sector, it is very crucial to be up to date with their cybersecurity measures. A </span><a href="https://www.paconsulting.com/insights/2018/cyber-security-in-airports/"><span style="font-weight: 400;">report </span></a><span style="font-weight: 400;">about airport cybersecurity by paconsulting.com cites the European Aviation Safety Agency (EASA) and outlines that around 1,000 cyberattacks on aviation systems are being done on a monthly basis. </span></p>
<h2><span style="font-weight: 400;">Fraport’s Challenge</span></h2>
<p><span style="font-weight: 400;">“Fraport Twin Star Airport Management” AD had to review the state and current level of security of IT systems and equipment deemed highly critical for national security and the company’s business. For this purpose, the organization needed experienced cybersecurity experts to execute regular advanced vulnerability scans and checks.</span></p>
<p><span style="font-weight: 400;">There were several main things that the company wanted to address: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Cover national cybersecurity regulations;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Spot corporate cyber risk exposure;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identify and implement remediation activities. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Regular C-level reporting</span></li>
</ul>
<p><span style="font-weight: 400;">The airport operator first turned to 3Cyber-Sec in the middle of October 2020. The reason was the legislative and regulatory requirements that they had to cover by the end of the same year. The airport management consortium had to cover and report status concerning the requirements of the national regulation for </span><a href="https://www.mtitc.government.bg/sites/default/files/nar_minimalnite_iziskvaniq_mrejova_info_sigurnost-072019.pdf"><span style="font-weight: 400;">minimum requirements in relation to network and information security</span></a><span style="font-weight: 400;">. And this needed to be done in around two months. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1245" src="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-5.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-5.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-5-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-5-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">3Cyber-Sec’s Solution </span></h2>
<p><span style="font-weight: 400;">The managerial team of “Fraport Twin Star Airport Management” AD chose to work with 3Cyber-Sec because of the good reputation of the company and its expert team. </span><b>They relied on the fact that the cybersecurity experts can deliver a high-quality solution in a short time that is tailor-made to the needs, themes, and problems that “Fraport” had. And this is exactly what happened. </b></p>
<p><span style="font-weight: 400;">The airport management consortium contacted 3Cyber-Sec to present a solution for Vulnerability Management Services. This involved the vulnerability management services on a regular basis, along with monthly security screening, reports, and analysis of the problems and issues in the cybersecurity of the company. “Fraport” had some catching up to do, especially in the area of internal cybersecurity infrastructure. Something they hadn’t looked into that much detail until they hired 3Cyber-Sec. </span></p>
<p><b><i>“„3Cyber-Sec” provided professional, timely, and comprehensive services that were highly appreciated by our IT team. As a result of our joint efforts, we were able to successfully address the national “Regulation on the minimum requirements for network and information security” and gain full visibility of the corporate cyber risk exposure.”</i></b><span style="font-weight: 400;"> &#8211; the team of “Fraport Twin Star Airport Management” AD.</span></p>
<p><span style="font-weight: 400;">The work plan was presented, discussed with, and approved by the client. The first thing that the team of 3Cyber-Sec did was to identify together with the staff of “Fraport” each key business services that corresponded to the infrastructure components that were going to be monitored regularly. </span></p>
<p><span style="font-weight: 400;">After that, the expert team of 3Cyber-Sec developed a plan for the screening of the different services and prepared cybersecurity reports based on the business needs of the clients. From the data gathered during the screening process, the team created both technical and C-level reports for each service that “Fraport Twin Star Airport Management” AD offers and their infrastructure. All of this was and the main findings were finally wrapped up in a C-level presentation about the cybersecurity state of the company that was presented to the client. </span></p>
<p><b><i>“We found 3Cyber-Sec’s team to be extremely responsive, attentive, and highly experienced, with in-depth knowledge in the vulnerability management area. ”3Cyber-Sec” reports empowered us to spend less time on identifying remediation activities and focus on remediation itself. Working with 3Cyber-Sec was the best choice we could have made.”</i></b><span style="font-weight: 400;"> &#8211; the team of “Fraport Twin Star Airport Management” AD.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1246" src="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-6.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-6.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-6-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/10/3Cyber-Sec-Social-Blog-Image-1200-x-630-6-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">The Outcome</span></h2>
<p><span style="font-weight: 400;">3Cyber-Sec managed to provide visibility to the vulnerabilities in cybersecurity that “Fraport Twin Star Airport Management” AD was not aware of and managed to help the client cover the requirements of the regulation and achieve compliance. The joint efforts and the fact that the team of “Fraport” was very cooperative helped the cybersecurity expert team deliver the service in a shorter time.</span></p>
<p><span style="font-weight: 400;">Without the help of 3Cyber-Sec, “Fraport Twin Star Airport Management” AD was going to delay their compliance with the requirements of the regulation. They probably wouldn&#8217;t be aware of the risks and vulnerabilities they had in cybersecurity.</span></p>
<p><b><i>“Based on our positive experience, “Fraport Twin Star Airport Management” AD acknowledges “3Cyber-Sec” as a trusted partner in the field of information infrastructure vulnerability testing. Our company would not hesitate to engage “3Cyber-Sec” again for future projects.”. </i></b></p>
<p><span style="font-weight: 400;">If you also need help in achieving compliance or you want to find out what are the potential vulnerabilities in your cybersecurity defenses, </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">contact us</span></a><span style="font-weight: 400;"> for a free consultation now. We are a boutique cybersecurity company and are always ready to answer the specific needs of each of our clients with tailored cybersecurity solutions. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/10/19/case-study-fraport-airport-management/">Case Study: How Fraport Twin Star Airport Management achieved compliance for important national standard</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/10/19/case-study-fraport-airport-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Case Study: How NRA InfoSec Team improved its penetration testing skills with comprehensive training</title>
		<link>https://3cyber-sec.com/2021/09/15/how-nra-infosec-team-improved-its-penetration-testing-skills/</link>
					<comments>https://3cyber-sec.com/2021/09/15/how-nra-infosec-team-improved-its-penetration-testing-skills/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Wed, 15 Sep 2021 06:19:06 +0000</pubDate>
				<category><![CDATA[Case Studies]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1207</guid>

					<description><![CDATA[<p>Learn how the NRA turned to 3Cyber-Sec for a solution about improving the awareness and skills of the InfoSec team of the national institution.</p>
<p>The post <a href="https://3cyber-sec.com/2021/09/15/how-nra-infosec-team-improved-its-penetration-testing-skills/">Case Study: How NRA InfoSec Team improved its penetration testing skills with comprehensive training</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The Bulgarian National Revenue Agency is a specialized state institution under the jurisdiction of the Minister of Finance. Its primary function is to administer taxes and social security contributions. It also has to collect other public and private state receivables. The NRA is one of the few entities that provide e-government services to Bulgarian citizens. The institution handles sensitive data, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Information about citizens’ income taxes;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">patent taxes; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">VAT and corporate taxes;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">health insurance;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">pension insurance;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">additional mandatory pension insurance data.</span></li>
</ul>
<p><b>It shouldn’t come as a surprise that the NRA is a desirable target for many cybercriminals. </b><span style="font-weight: 400;">Moreover, the cyber risks for the NRA are further enhanced by the lack of qualified IT employees in Bulgarian public agencies and noncompetitive salaries compared to the private sector, as a 2018 government report suggests. According to the report </span><a href="https://www.segabg.com/node/81845"><span style="font-weight: 400;">cited by segabg.com</span></a><span style="font-weight: 400;">, </span><b><i>&#8220;technical, technological and personnel deficits in state institutions and companies of national security importance are of a lasting nature, and the measures taken to eliminate them, remain insufficient to counter modern challenges&#8221;</i></b><span style="font-weight: 400;">.</span></p>
<h3><b>NRA’s Challenge</b></h3>
<p><span style="font-weight: 400;">As with any other large organisation or enterprise, the NRA is also </span><b>challenged with finding well-experienced professionals who are willing to become part of the team and contribute to the cybersecurity of the agency</b><span style="font-weight: 400;">. Back in 2020, NRA’s existing cybersecurity staff had to ensure the cyber resilience of the agency’s networks and systems to avoid and minimize any potential incidents in the future. To do this, the NRA needed to:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enhance the </span><a href="https://3cyber-sec.com/staff-awareness/"><span style="font-weight: 400;">cybersecurity awareness</span></a><span style="font-weight: 400;"> of the agency’s Information Security team;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">А key goal for the agency was to ensure that its InfoSec team had an understanding of cyberattack approaches gained through practical experience;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Getting a clear view of potential cyberattack impacts was also a priority for the NRA. </span></li>
</ul>
<p><b><i>“We needed a professional and competent partner for advanced cybersecurity penetration testing training to teach our internal team techniques used by cybercriminals for real-world cyberattacks.”</i></b><span style="font-weight: 400;"> &#8211; NRA’s team </span></p>
<p><span style="font-weight: 400;">Additional pressure came from the public and media, given the fact that not so long ago there was a huge scandal involving the NRA in a </span><a href="https://www.nytimes.com/2019/07/17/world/europe/bulgaria-hack-cyberattack.html"><span style="font-weight: 400;">security breach of the data of almost all citizens of Bulgaria</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">The biggest challenge for the agency at that moment, however, was the fact that </span><b>they needed to conduct the training in a very short time.</b><span style="font-weight: 400;"> Just over a month before the deadline, the NRA contacted 3Cyber-Sec as a part of the regular tender process, explaining their specific needs.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1209 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h3><b>3Cyber-Sec’s Solution </b></h3>
<p><span style="font-weight: 400;">To improve the cybersecurity awareness of NRA’s InfoSec team, 3Cyber-Sec had to urgently conduct a comprehensive penetration testing training, which needed to focus on the specific vulnerabilities and risks faced by the agency. What 3Cyber-Sec did for the NRA involved:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The penetration testing (also referred to as ethical hacking) training &#8211; had the goal of educating NRA’s InfoSec team about the organization’s potential vulnerability to cyberattacks;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">3Cyber-Sec’s team provided advice and instructions to NRA’s staff on how to practically compromise NRA’s networks &#8211; this would help them gain an in-depth understanding of the potential hacking strategies cybercriminals may use to attack NRA’s networks;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Through practical experience, NRA’s InfoSec team will acquire better visibility of the critical vulnerabilities and weak spots in the agency’s defense systems. </span></li>
</ul>
<p><span style="font-weight: 400;">With no internal knowledge of NRA’s networks and systems, the biggest challenge for 3Cyber-Sec was the tight deadline and specific technology requirements they were faced with. </span><b>For less than a month, 3Cyber-Sec’s team developed a customized training environment and sessions tailored for the NRA team. They were also aligned with the specifics of the technology toolset used by the company.</b><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">Based on the requirements, 3Cyber-Sec outlined key topics for the training and created a list of practical tasks and challenges, which could enable NRA’s InfoSec team to ethically hack the agency and thus gain a better understanding of possible attack tactics. Once they prepared the training materials, 3Cyber-Sec conducted a 5-day </span><a href="https://3cyber-sec.com/penetration-testing/"><span style="font-weight: 400;">penetration testing</span></a><span style="font-weight: 400;"> course that was held in an isolated technological environment. The training schedule included both theoretical sessions with lecturers, as well as practical workshops guided by 3Cyber-Sec’s team. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1210" src="https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600-1.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600-1.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600-1-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-blog-image-1200-x-600-1-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h3><b>The Outcome</b></h3>
<p><span style="font-weight: 400;">As a result of the intensive 5-day penetration testing course organized and conducted solely by 3Cyber-Sec, five members of NRA’s InfoSec team were fully trained and gained crucial knowledge of potential cyberattack tactics that could penetrate NRA’s defense systems. </span><b>It’s important to note that some of the trained professionals didn’t have any previous experience with penetration testing tools and methodology. </b><span style="font-weight: 400;">Despite that fact, for just 5 days the NRA’s InfoSec team was able to gain control over 26 machines in a laboratory setting and 14 web-based applications. </span></p>
<p><b>“</b><b><i>We found an ally in the face of 3Cyber-Sec Ltd. The straightforward approach they took during the 5-day course, did fit very well with our internal team’s needs. The methodical presentations and onsite practical exercises were done with the proficiency and competency we were expecting. As a result, the National Revenue Agency’s information security team managed to gain a thorough understanding of an attacker’s approach.</i></b><b>” </b><span style="font-weight: 400;">&#8211; NRA’s team</span></p>
<p><span style="font-weight: 400;">The success of the penetration testing training provided by 3Cyber-Sec was further enhanced by the dedication of NRA’s InfoSec team, who were actively participating with a determination for acquiring precious know-how and enriching their current expertise. Furthermore, 3Cyber-Sec’s team received full support and cooperation from NRA’s management, which enabled them to successfully conduct the training in such a short period. </span></p>
<p><b>Without 3Cyber-Sec’s help, NRA’s team would not know the actual methods and attack vectors that could penetrate NRA’s defense systems. </b></p>
<p><span style="font-weight: 400;">If you’re also not sure which are the weak spots in your organization’s networks, </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">contact us for a free consultation</span></a><span style="font-weight: 400;"> now. As a boutique cybersecurity company, we are always ready to answer the specific needs of each of our clients with tailored cybersecurity solutions. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/09/15/how-nra-infosec-team-improved-its-penetration-testing-skills/">Case Study: How NRA InfoSec Team improved its penetration testing skills with comprehensive training</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/09/15/how-nra-infosec-team-improved-its-penetration-testing-skills/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
