With over 20 years of Cyber Security Expertise, AC Information Security is the cyber security partner of choice worldwide.
Our technical staff have world renown certifications such as the OSCP, OSCE, OSWP, CREST CRT and many more. Our staff also serve on advisory boards and conference review boards worldwide!
- Cyber Security Investment (M&A Consulting and Advisory)
- Cyber Security Company Investments and Acquisitions
- Non Executive Director Services
- Attack and Penetration Testing & Red Teaming
- Security Consulting Services
- CISO and Chair as a service
- Information Security Training
- Cyber Security Talent Acquisition
We have serviced many different industries such as:
- Banking and Insurance
As the cyber security landscape continues to evolve, it's more important than ever to have a trusted advisor by your side. We understand the challenges and opportunities of investing in cyber security companies, and we're here to help you navigate through them.
Our service includes:
We work closely with our clients to understand their unique needs and goals, and we use our extensive knowledge of the cyber security market to help them make informed decisions. Whether you're a venture capitalist, private equity firm, or a strategic buyer, we can help you identify and execute the right investment or acquisition.
Don't navigate the complex cyber security market alone. Contact us today to learn more about how we can help you achieve your investment and M&A goals.
This service provides expert guidance and support for businesses in need of a non-executive director with a strong background in cyber security. Our team includes a seasoned cyber security founder who has successfully built and consulted hundreds of companies worldwide in this field, and has a wealth of experience to share.
Our service includes:
We understand that the role of a non-executive director is to provide independent oversight and support, and we are committed to helping your business thrive. Our team has the knowledge and experience to provide valuable guidance and support to help your business navigate the ever-evolving cyber security landscape.
CISO as a service:
CISO-as-a-Service (CISOaaS) involves outsourcing the IT security leadership responsibilities to a third-party provider. During the past 12 months, the demand for hiring a third-party provider to support implementing an IT security strategy has been growing significantly. Therefore, we offer this service to our customers as finding the right staff for the position is often difficult given the skills shortage.
Chair as a Service:
Chair as a Service is an organisation that can help you to achieve the objectives of your meetings in an efficient, constructive manner - we also focus on the security aspect of the organisation heavily.
AC Information Security offers a variety of custom and tailor made solutions, our common pre-made courses though are Ethical Hacking, Web Application Hacking, Social Engineering Hacking and Exploit Development Courses.
This agreement is perfect for those with smaller IT budgets, or larger corporates that would like to maintain the work that was done as part of a larger vulnerability assessment. You can utilise consulting hours or days as required, in terms of our service portfolio offerings. This option is done on a month-to-month basis and can include the various services we offer in monthly or annual package.
We understand the importance of finding top talent in the field of cyber security, and we're here to help. Our team of experts has years of experience in the industry and an extensive network of professional contacts. We use the latest recruitment techniques and technologies to find the best candidates for your organisation.
Our service includes:
We pride ourselves on our ability to find the right candidates quickly and efficiently, while also ensuring that they are a good fit for your organisation. Trust us to help you build a strong and secure team.
Penetration Testing (External and Internal):
Hire a hacker to identify and report on a wide variety of security vulnerabilities within your organisation.
The objective of this service is to identify and report on security vulnerabilities on a wide level to allow you to close the issues,thus raising the level of your security protection overall.
Red Team (attack simulation):
Hire us to mimic your real-world adversaries! Rather us than a real criminal right? Our Red Team assessment is the most realistic and comprehensive assessment that we offer. During these assessments, we find entry points into the organisation by any means possible. Red Team assessments are best if you want to see what techniques real-world adversaries, that aren't constrained by scope, might use.
Web and Mobile Application Assessments:
Our manual web and mobile application assessments identify and report on security issues related to online web applications. Our assessments make use of hands on methods (not tools) and typically we assign one or two security analysts to new engagements.