Eva is Managing Partner and CEO of Alzette Information Security with more than 8 years of professional experience in penetration testing, security source code review, digital forensics, IT auditing, telecommunication networks and security research. She has two Master’s degrees; one in Electrical Engineering and another one in Networks and Telecommunication.
She holds the following industry-recognized information security certifications: GIAC Security Essentials Certification (GSEC), Global Industrial Cyber Security Professional (GICSP), GIAC Secure Software Programmer-Java (GSSP-JAVA), GIAC Web Application Penetration Tester (GWAPT), GIAC Mobile Device Security Analyst (GMOB), eLearnSecurity Web Application Penetration Tester (eWPT), eLearnSecurity Junior Penetration Tester (eJPT), QualysGuard Certified Specialists (QGCS).
Eva has spoken at international conferences like BSidesBUD (2018), BSides Munich (2018), Security Session (2018) and she is a member of the organizer team of BSides Luxembourg.
David is Managing Partner and CTO of Alzette Information Security with more than 8 years of professional experience in penetration testing, red teaming, vulnerability assessment, vulnerability management, security monitoring, security architecture design, incident response, digital forensics and software development. He has two Master’s degrees; one in Computer Engineering and another one in Networks and Telecommunication and also has a Bachelor’s degree in Electrical Engineering.
He holds the following industry-recognized information security certifications: GIAC Security Essentials (GSEC), GIAC Certified Enterprise Defender (GCED), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), GIAC Continuous Monitoring Certification (GMON), GIAC Network Forensics Analyst (GNFA), GIAC Python Coder (GPYC), GIAC Mobile Device Security Analyst (GMOB), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), EC-Council Certified Ethical Hacker (CEH), eLearnSecurity Certified Professional Penetration Tester (eCPPT Gold), eLearnSecurity Mobile Application Penetration Tester (eMAPT), eLearnSecurity Network Defense Professional (eNDP), SecurityTube iOS Security Expert (SISE), Sophos Certified Architect (UTM), Sophos Certified Engineer (UTM, Web Protection), Palo Alto Networks: Accredited Configuration Engineer (ACE), QualysGuard Certified Specialists (QGCS).
David has presented at conferences like BruCON (2017), Hack.lu (2013, 2016, 2017), Hacktivity (2008 and 2016), BSidesBUD (2017, 2018), BSidesLjubljana (2017), BSides Munich (2018), Nuit du Hack (2017), Security Session (2018), SANS @Night Talks (2017, 2018), and member of the organizer team of the Security BSides Luxembourg conference.
Deployment, fine-tuning and management of open source and commercial Network or Host-based Intrusion Detection/Prevention System (NIDS/NIPS or HIDS/HIPS), Network Security Monitoring (NSM) and Security Information and Event Management (SIEM) solutions. Threat hunting exercises to proactively identify signs of compromise.
Digital Forensic (DF) and Incident response (IR) activities, analysis of artifacts, disks, memory images and mobile devices using methodologies, procedures, techniques and industry-accepted hardware and software solutions that preserve the chain of custody and admissible in a court of law.
Dynamic and static analysis of malicious software and cross-checking results with threat intelligence sources like CIRCL's Malware Information Sharing Platform (MISP).
Defensible network, endpoint and application architecture designs, reviews and audits using tried and tested security models, methods, components and concepts.
Training for professionals; network security, endpoint security, network security monitoring, log analysis and monitoring, penetration testing, secure coding. User awareness programs for employees, professionals, developers, and executives.
Security source code review services for languages including but not limited to Java, JSP, ColdFusion, PHP, .NET, C/C++, Python.
Vulnerability assessment services using automated scanners configured for the target environment, where results are manually evaluated by experts to remove false-positives. Continuous assessment and remediation of vulnerabilities through our vulnerability management services.
External and internal network penetration testing, wireless penetration testing based on methodologies like the Penetration Testing Execution Standard (PTES) or the Open Source Security Testing Methodology Manual (OSSTMM). Red team engagements that include social engineering, physical penetration and advanced techniques like USB HID attacks.
Web, mobile and thick/binary application penetration testing based on methodologies like the Open Web Application Security Project (OWASP) Testing Guide.