About Cybercon

Based on the multiyear experience in the financial and military sector, we are able to support you with our multi-domain consulting services in the areas of cyber security, cyber incident handling, it-infrastructure hardening, security logging and monitoring, advanced malware prevention and continuous improvement.

Circle Diagram


With our “security by design” architecture consulting services we are able to fundamentally reduce your attack surface and optimize your “Return On Security Investment”

Detect and Improve

We consult you with our “hands-on” experience in Security Analysis and Security Hardening.


We offer 12 years of experience in Security Operations and Cyber Security Incident Management

Our Services

Log Collection & Correlation Icon

Log Collection & Correlation

We provide a large experience in the conceptional design and implementation of log collection solutions as e.g. Splunk and the correlation of these logs into meaningful cybersecurity events.

Cyber Education and Awareness Icon

Cyber Education and Awareness

We train your team, project members, military staff and exposed individuals as well as their families.

Denial of Service Defense Icon

Denial of Service Defense

We offer "hands-on" experience in the prevention and mitigation of DDoS attacks against your company network or remote site locations.

Incident Response Icon

Incident Response

As certified experts in handling cyber incidents, we support you in the entire process from the detection of a cyber security incident until its closure.

Open Source Intelligence Icon

Open Source Intelligence

We offer you an analysis of the publicly/hidden information on the internet, regarding your person, your company and your IT-Infrastructure

PCI DSS 3.0 Network design Icon

PCI DSS 3.0 Network design

We provide you with a network design and zoning concept to reduce the scope of your PCI DSS audit and to improve the protection of your credit card holder data.

Strategy & Architecture Icon

Strategy & Architecture

We support you in creating the security architecture that fits your risk profile or review the existing one for potential gaps.