Level 40/100 Barangaroo Ave Barangaroo NSW 2000
info@skylightcyber.com
https://skylightcyber.com/

Skylight Cyber

Skylight Cyber is a boutique cybersecurity practice based in Sydney, Australia providing high-end cyber security services to enterprises globally. Our approach combines a balanced blend of bespoke business and process risk analysis with offensive cybersecurity capabilities formed in the trenches. We take the time to understand your business in the context of modern cybersecurity threats, focusing our risk lens on what is important to you.

Our Representatives

Adi Ashkenazy
CEO

|  Linkedin

Shahar Zini
CTO

|   Linkedin

OUR CAPABILITIES INCLUDE:

– Penetration Testing
& Red Team
– Design 
& Architecture
– Incident 
Response
– Cybersecurity Strategy
& GRC
– Training
& Simulations
– Technical
Due Diligence

OUR CORE SERVICES:

PENETRATION TESTING & RED TEAMING
We can perform penetration testing and / or red team of your IT and OT environment. Additionally, we seek out the root cause issues in your security processes to ensure longer-term remediation of security issues that we find.

Benefits & Outcomes
– Understand your threat profile and key risk scenarios
– Identify security control gaps in your IT and/or OT environment
– Receive remediation advice that considers your business environment and requirements

SECURITY ARCHITECTURE & REVIEW
We work with your teams to identify security gaps in your current architecture and co-design a solution with you that balances security and business productivity.

Benefits & Outcomes
– Understand the key risk scenarios that can impact your business
– Co-design a secure IT and/or OT architecture that addresses your key risk scenarios

SECURITY CONTROLS & PROCESS REVIEW
We identify gaps in security processes and manual controls and provide recommendations on how to remediate gaps and better design security processes that meet your business risk appetite.

Benefits & Outcomes
– Understand the key risk scenarios that can impact your business
– Receive remediation advice on security processes that balances security and business productivity

Loading...