Become a partner

Ján Kromel

LYNX , security specialist
After graduation at high school he started to attend Comenius University of Bratislava, where he has earned PhD. in petrology. From 2006 he started to work for Lynx - spoločnosť s ručením obmedzeným, Košice as the security specialist where he become team leader of the „Forensic analysis and penetration testing department“. In 2009 he has passed Sun Certified System Administrator certification, in 2015 he has passed SANS GIAC Mobile Device Security Analyst certification and in 2017 has passed SANS GIAC Reverse Engineering Malware. With over 10 years of professional experience in security his interests are headed to forensic analysis, security of mobile devices, penetration testing and mix of these fields.

The top of the professional experiences from mentioned fields are mostly from participation and cooperation with public sector institutions.
After all these years and experiences, he still considers himself as the beginner with big necessity and will to learn more and more.

 
  • Hunting season
    Cyber security is a "living", ever-evolving ecosystem that responds to external and internal factors affecting asset security. With the growing complexity of protected assets and the parallel factors affecting them, there is a constant pressure to implement protection automation. The result of this pressure is often a marketing-attractive product announcing almost zero cooperation of human resources in the process of asset protection. The presentation will focus on the basic selected theses and myths of threat hunting and its position in the "global process" of proactive protection of the subject's assets.
  • Hannibal before the gates! Alternatively, already behind…?

    Together with the development of information systems and technologies, there is a significant change in the global security environment. Cyberspace has become a major area of massive crime in recent years. The protection of privacy, freedom, property and other intellectual values is of interest to any subject involved. Different protection of the perimeter and the endpoints are invariably invested, but in essence, most of them without any subsequent internal prevention steps. Classical or reincarnated paradigms of security largely "degrade" forensic analysis to investigate a security incident. The aim is to prevent a security incident and not only to deal with the consequences afterwards. Considering the strength of forensic analysis, we consider constructively guided forensic analysis as a significant form of proactive protection and security of the environment.

Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným