Pineda Cybersecurity conducts effective workshops that go beyond the four corners of a room. Our clients do not only learn but also apply their earned knowledge in actual situations once the workshop comes to a close. Led by industry practitioners who are experts in their respective cybersecurity domains, training, and courses on information security are curated based on best practices and real-world experiences, which they have acquired throughout their years in the industry.
Whether you’re a beginner or have already mastered the field of IT, we have clear-cut lessons that focus on advancing your skills and are relevant and timely in the age of cyberattacks.
We efficiently match applicants to the right roles who will greatly contribute to steering your company towards further success. With a database for both aspirants and companies looking for potential employees, job matching is done based on the required skills and competence of the candidates in cybersecurity and includes profile and salary analysis.
Periodic Vulnerability Assessment
Seasoned assessors who have worked in large, global firms are here to conduct security assessments to determine existing vulnerabilities in the application, host and network levels based on your needs. We have a systematic and framework-based Vulnerability Assessment and Penetration Testing (VAPT) and use state-of-the-art tools to identify exposure and reduce risks to protect your assets. It’s a subscription-based approach, where you can choose from our On-demand, Daily, Weekly, Monthly, Quarterly, Semi-annual or Annual packages.
Application Security Testing
Following the Open Web Application Security Project (OWASP) Testing Guide, we perform white and black-box testing and detect applications that have possible exploitable vulnerabilities as we provide recommendations on how to fix them. Instead of relying on tools, we focus on manual validation using custom payloads and have Proof-of-Concept (POC) instructions that serve as a guide.
Open Source Security Infrastructure
Quality digital protection doesn’t have to be expensive. At Pineda Cybersecurity, we introduce cost-effective and adaptable implementation using open source/free customizable solutions with the same capacity as its industry-level counterparts. Tools such as Firewalls, NIDS/NIPS, HIDS, DLP, and WAF applied in tracking attackers, analyzing risks, creating reports, and fixing real-time threats to guarantee freedom from possible cyber danger.
Managed Security Operations
You don’t have to worry about managing your operations anymore. Allow us to do the behind-the-scenes work for you so you can focus on designing your plan of action. We offer out-of-the-box options that can either implement, monitor or do both in the infrastructure, report and respond, all based on its extremity.
As we determine threats, we come up with innovative resolutions that can also be in the form of staff augmentation to avoid digital disruptions from happening in your system. Note that the level of dependence on service may vary per situation, and package depends on the number and types of devices, type of response and time of coverage and monitoring.
ISO 27001 Compliance
For you to gain the trust of your clients, safeguard your image and reach an international-level of recognition, an ISO Certification is needed. Our tested and experience-based assistance in aligning your processes and documents will help you prepare for the ISO 27001 Compliance— in which we will implement an assessment and readiness check, conduct interviews, provide a training staff and execute a mock audit.
Data Privacy Compliance
To ensure compliance with the RA 10173 or the Data Privacy Act, certain requirements and actions are needed to meet the submission. Pineda Cybersecurity guarantees rapid compliance that comes with a free initial assessment, audit and roadmap that covers the law’s five (5) pillars (Appointment of a Data Protection Officer, Conducting a Privacy Impact Assessment, Creation of a Management Program, Implementation of Data Privacy and Security Measures and Preparedness in Case of a Breach) or whichever pillar the organization needs.