About

Defensive

We strongly believe that only combination of deep, low-level defensive and offensive security hands-on skills can guarantee secure operations and successful IT deployments.

Our mission

Our mission is to help organizations have more secure infrastructures, better utilize Open Source software in Security Operations, and enable businesses to improve the detection capacity and skills of their SOC/Incident Response teams.

Why us

Our Certificates

Conferences

44CON 2019/2020

44CON is an Information Security Conference & Training conference taking place in London. It is designed to provide something for the technical and business Information Security professionals.

Copenhagen Cybercrime Conference 2019

The Cyber Security Conference that focuses on sharing knowledge rather than sales pitches. Attending this conference enables participants to learn about cyber security’s most important current issues, meet and network with international and regional cybersecurity practitioners and focus on original ideas drawn from real-world situations.

SECURE 2019

SECURE Conference is one of the most important IT Security events in the calendar of polish *Cyber Security* conferences. As it appears on the web page, it's organized by NASK and CERT Polska operating within the structure of NASK

Infosec in the City 2019

Infosec in the City, Singapore (IIC-SG) is a premier techno-centric cybersecurity event that brings top cybersecurity leaders and experts from both the East and the West together to share and discuss deep technical topics and insights, and build the next-generation cybersecurity capabilities and capacity around the globe.

Hack In The Box 2018/2019/2020

Hack In The Box Security Conference is an annual must attend event in the calendars of security researchers and professionals around the world. Held annually in Kuala Lumpur, Malaysia and Amsterdam in The Netherlands, HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues.

Black Hat USA 2019

Black Hat is the most technical and relevant information security event series in the world. For more than 20 years, Black Hat Briefings have provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment.

Brucon 2017/2018

BruCON is an annual security and hacker(*) conference organized in Belgium, providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society.

Exatel Security Days 2017

One of the best commercial IT Security Conference in Poland. In 2017 I presented: "May the data stay with U! - Network Data Exfiltration Techniques."

Confidence 2016

The most famous IT Security Conference in Poland since 2005. In 2016 I had a speak about "Honey(pot) flavored hunt for cyber enemy". CONFidence gathers 500 attendees each year.

PLNOG 2016

The biggest Polish Network Operators Group Conference. In 2016 I had a presentation "Yo, yo! It's us, packets! Catch us if you can."

OWASP Poland

Polish chapter of Open Web Application Security Project - non-profit organization focused on improving the security of software. In 2013 I was speaking about Web Application Firewall - "Mod security - does your WAF can do it?"

Open Source Day

The biggest Open Source Conference in Poland as well as in EMEA region. In years 2008-2014 I was going deeply into SELinux, Linux Hardening, Web Application Security and new features in Red Hat Enterprise Linux.

Atmosphere 2014

Atmosphere 2014 – Performance and Scalability (500+) - Warsaw: “Scalable and under control - open cloud architecture considering security standards.”

Why us

  • Defensive Security provides high-quality cyber security services including Linux / Windows digital forensics, incident response, latest threat analysis, and hunting, penetration testing, and infrastructure hardening. We successfully deliver a combination of Threat/Adversary Emulations vs network/endpoint investigations and log analysis at scale which is known as Purple Teaming.
  • We are trusted by the biggest customers from the private, oil and gas, insurance, and financial sector. 
  • Advanced training sessions delivery during the biggest conferences including Hack In The Box, BruCON, 44CON, OWASP AppSec US, and Black Hat US.
  • Almost 20 years of hands-on experience with Open Source Security Solutions go directly into the full spectrum of technology solutions to support customers achieving better visibility and detections, improving offensive and defensive Red / Blue and Purple team skills, validating defensive technology stacks, and helping understand the value of the Assume Breach approach and emulation of threats after getting initial access (C2, Lateral Movement, Persistence, Evasion).
  • Defensive Security offers advanced, hands-on cyber security training programs backed by PurpleLabs - a fully customized Cyber Range Environment enriched by step-by-step offensive/defensive lab instructions. Want to sharpen your Purple team skills? Try PurpleLabs where you will be playing with chained attack paths, emulating attacker's TTPs, and running detection/response at the same time by using Sysmon and EVTX, Auditd, Wazuh, Graylog, HELK, ElastAlert, Falco, OSQuery, Velociraptor, Zeek, Suricata, Moloch FPC, Volatility Framework, theHive, MISP, and Sigma Rules.
  • Talks at conferences: Secure 2019, Cyber Hagen 2019, Advanced Threat Summit 2019, Confidence 2016 (“Honey(pot) flavored hunt for cyber enemy), PLNOG 2016 (“Yoyo! It’s us, packets! Catch us if you can”), NGSEC 2016 (“Many security layers for many defensive opportunities”), Open Source Day 2010/2011/2012/2013/2014, SysDay 2008 (“SELinux vs exploits”), Confitura 2014 (“Detection and elimination of threats in real-time - OWASP Appsensor in action.”), Red Hat Roadshow 2014, OWASP Chapter Poland 2015(“Does your WAF can handle it?), ISSA InfoTrams 2015, BIN Gigacon 2015(“Mapping pentester's knowledge for the need to protect a critical IT infrastructure”).
  • An associate member of ISSA and OWASP Poland Poland.

If you need to get deep and broad knowledge in the scope of Defensive Security using Open Source software then don't hesitate and just grab for it - definitely worth to attend and meet Leszek in person and his experience during 3 days long comprehensive technical training. "

Wojciech Dworakowski CEO at SecuRing

Our clients include