Services

Cybersecurity

We protect your infrastructure with an attacker's mindset. Field experience, international certifications and academic research at the service of your security.

At FORSEC, we combine the depth of university research with hands-on experience gained over years of field work. Our team includes OSCP (Offensive Security Certified Professional) certified professionals who have conducted hundreds of security tests for companies of all sizes.

Penetration Testing

We simulate real attacks to identify vulnerabilities before cybercriminals do. We don't just run automated scanners: we analyze your infrastructure with an attacker's mindset.

What's included:

  • Web application and API testing
  • Internal and external network penetration testing
  • Cloud infrastructure testing (AWS, Azure, GCP)
  • Social engineering and phishing assessment
  • Detailed report with prioritized remediation

Vulnerability Assessment

Systematic analysis of your infrastructure to identify and classify security vulnerabilities. A fundamental first step to understanding your security posture.

What's included:

  • Automated scanning and manual validation
  • Configuration and policy analysis
  • Compliance assessment (GDPR, ISO 27001, NIS2)
  • Vulnerability classification by criticality
  • Risk-based prioritized remediation plan

Who it's for:

Ideal for companies needing a complete picture of their security or those who must meet regulatory compliance requirements.

OT/ICS Security

We protect industrial control systems (ICS) and OT infrastructures. Our research on physics-aware attacks and industrial honeypots enables us to understand the specific threats in this sector.

What's included:

  • SCADA and PLC security assessment
  • Industrial protocol analysis (Modbus, S7)
  • IT/OT segmentation and secure architecture design
  • ICS-specific threat intelligence
  • Incident response for industrial environments

Some results of our research:

We developed HoneyICS, a high-interaction honeynet for industrial systems, and conducted research on physics-aware attacks against maritime control systems. Publications in international journals attest to our competence.

Cyber Range Training

We train your employees with realistic scenarios on our CHECK platform. Not theory, but hands-on practice in environments that replicate real infrastructure.

What's included:

  • Access to CHECK Cyber Range platform
  • Customized attack and defense scenarios
  • Red Team vs Blue Team exercises
  • Incident response training
  • Skills certification

Digital Forensics

Acquisition and analysis of digital evidence with methodologies that ensure admissibility in legal proceedings. Our methodology ensures integrity and verifiability of evidence.

What's included:

  • Forensic acquisition of devices and systems
  • Security incident analysis
  • Web forensics
  • Technical expert reports for legal proceedings
  • Data breach support

Consulting & Research

Strategic support for defining security policies, architectures and roadmaps. We also collaborate on nationally and EU-funded research projects.

What's included:

  • Security policy and procedure definition
  • Secure architecture design
  • Certification support (ISO 27001)
  • Research project collaboration
  • Technology transfer and innovation

Track record:

We have coordinated work packages in PNRR (SERICS) and regional projects, collaborating with universities, research institutions and large enterprises on cutting-edge cybersecurity topics.

Want to assess your infrastructure security?

Contact us for a no-obligation initial discussion. We'll analyze your needs together and propose the most suitable approach.

Request a consultation