CYCON Security Ltd.
Dan Fromovich is an experienced cybersecurity professional, currently serving as Co-Founder and CTO at CYCON Security Ltd. since January 2022, where Dan focuses on developing automated incident response products. In addition, Dan holds the position of CTO and Cyber Defense Incident Responder at INTENSITY Global Group, leading global tech and incident response teams. Prior experience includes roles as Head of Penetration Testers at InnoSec Ltd., where Dan specialized in various forms of penetration testing and AWS cloud security, as well as positions at IPV Security, a freelance full-stack developer, and a technical support engineer. Dan's educational background includes studies at HackerU, See Security, The Open University, and ORT Hermelin.
This person is not in any teams
CYCON Security Ltd.
CYCON Security is a cyber security company that develops an automated IR product that gives the possibility to see the whole story of the attack from the beginning to the end: 1. Intelligence Gathering: How a hacker sees the organization from the outside by collecting intelligence from the Dark Net and attacker's forums to identify leaked user's credentials and confidential information. 2. Endpoints and Servers Investigation: An anomaly investigation in the endpoints/servers to identify suspicious behavior that runs in real-time. The CYCON-IO platform knows how to identify unknown behavior and malicious code on endpoints/servers and gives an indication of the source of the attack. 3. Network communication: Identifying suspicious communication between computers/servers and outgoing and incoming communication. The expertise of the CYCON-IO platform makes it possible to automatically identify and block suspicious communication against malicious IP addresses. Our Experience : Defensive * IR - Incident Response. * Cyber Intelligence. * Vulnerability Assessment. * Cyber Training. Offensive ( Prevetative ) * Tactical Intelligence - Offensive. * Red Team. * Blue Team. * Penetration Testing - Application/ Infrastructure. * Threat Modelling. * Cyber Threat Intelligence ( CTI ) Strategic * Compliance & Regulation. * Proofs Of Concept. * Assess New Technology. * Policy & Procedure Writing. * Remediation Work Plan.