• Home
  • Penetration Testing

      Penetration Testing Services

    • Application Penetration Testing
    • Breakout testing - Citrix and network pivoting
    • Infrastructure Penetration Testing
    • IoT Penetration Testing
    • IVR System Penetration Testing
    • Mobile Application Penetration Testing
    • NCSC IT Health Checks
    • Red/Blue/Purple Teaming
    • Social Engineering
    • Supply Chain testing
    • Web Application Penetration Testing
    • Wireless Penetration Testing
    • Cloud Penetration Testing

    • AWS Cloud Penetration Testing
    • Azure Penetration Testing

      Penetration Testing Information

    • What Is API Security Testing?
    • What is Authentication?
    • What is Penetration Testing?
    • What is Phishing?
    • What is Red Teaming?
    • What is Social Engineering?
  • Compliance

      Compliance Services

    • Cyber Assurance Certification
    • Cyber Essentials Plus Certification
    • GDPR Compliance
    • ISO 27001 Compliance
    • PCI DSS Compliance
    • PCI DSS QSA Consultancy
    • PCI DSS ASV Scanning
    • PECR Compliance
    • PSN Compliance (ITHC)
    • Cyber Maturity Assessment
    • Data Protection Impact Assessments (DPIA)
    • Training Services

      Compliance Information

    • Developing a SME Cyber-security Policy
    • PCI Compliance
    • Securing Your eCommerce Platform
    • The ProCheckUp 12 Steps to GDPR Guide
    • What is Agile SDLC? (Software Development Life Cycle)
    • What is Cyber Essentials?
    • What is Cyber Security?
    • What is ISO27001 Annex A?
    • Transitioning to PCI-DSS v4.0
  • Security Assessment

      Security Assessment Services

    • Architecture Security Review
    • Build Reviews
    • CREST STAR Assessments
    • Data discovery
    • Device Security Reviews
    • External Internet discovery
    • Internal Network Discovery & Mapping
    • Managed Scanning Service (VA)
    • M&A Security Assessment
    • Virtual/Onsite CISO Services
    • OSINT Services
    • Physical Security Audit
    • Network Segmentation Testing
    • Targeted Attack Resistance Assessment
    • Vulnerability Assessment

      Security Assessment Information

    • What are Build Reviews?
    • What is a Code Review?
    • What is Cyber Security?
    • What is Edge Testing?
  • Incident Response Services

      Security Assessment Services

    • Breach Impact Assessments
    • eDisclosure & eDiscovery
    • Digital Forensics
    • Forensic Readiness Planning
    • Gold Teaming
    • Malware Analysis & Reverse Engineering
    • Intrusion Analysis & Compromise Assessment
    • Incident Response Services
    • Incident Response Retainer
    • Technical Services Counter Measures (TSCM)
    • Forensic First Responder (FFR)

      Incident Response Information

    • Introduction to Ransomware Protection
    • Stolen Laptop Case Study
    • What is Cyber Security?
  • Sectors

      Sectors

    • Central Government Sector
    • Energy and Utilities Sector
    • Financial Services Sector
    • HealthCare Sector
    • Local Government Sector
    • Manufacturing Sector
    • Retail and E-Commerce Sector
  • About Us
    • Company
    • Accreditations
    • News
    • Blogs
    • Careers & Team
    • Privacy Policy
  • Events
  • Contact
+44(0)207 6127777
  • Penetration Testing

        Penetration Testing Services

      • Application Penetration Testing
      • Breakout testing - Citrix and network pivoting
      • Infrastructure Penetration Testing
      • IoT Penetration Testing
      • IVR System Penetration Testing
      • Mobile Application Penetration Testing
      • NCSC IT Health Checks
      • Red/Blue/Purple Teaming
      • Social Engineering
      • Supply Chain testing
      • Web Application Penetration Testing
      • Wireless Penetration Testing
      • Cloud Penetration Testing

      • AWS Cloud Penetration Testing
      • Azure Penetration Testing
      • Pentesting Information
      • What Is API Security Testing?
      • What is Authentication?
      • What is Penetration Testing?
      • What is Phishing?
      • What is Red Teaming?
      • What is Social Engineering?
      • Useful Pages
      • Apply for corporate account.
      • Talk to a cybersecurity expert.
      • Security Research.
      • ProCheckUp's Engagement Process.
      • Portal access.
      • Reporting access.
  • Compliance

        Compliance Services

      • Cyber Assurance Certification
      • Cyber Essentials Plus Certification
      • GDPR Compliance
      • ISO 27001 Compliance
      • PCI DSS Compliance
      • PCI DSS QSA Consultancy
      • PCI DSS ASV Scanning
      • PECR Compliance
      • PSN Compliance (ITHC)
      • Cyber Maturity Assessment
      • Data Protection Impact Assessments (DPIA)
      • Training Services
      • Compliance Information
      • Developing a SME Cyber-security Policy
      • PCI Compliance
      • Securing Your eCommerce Platform
      • The ProCheckUp 12 Steps to GDPR Guide
      • What is Agile SDLC? (Software Development Life Cycle)
      • What is Cyber Essentials?
      • What Is A Cyber Maturity Assessment?
      • What is Cyber Security?
      • What is ISO27001 Annex A?
      • Transitioning to PCI-DSS v4.0
      • Useful Pages
      • Apply for corporate account.
      • Talk to a cybersecurity expert.
      • Security Research.
      • ProCheckUp's Engagement Process.
      • Portal access.
      • Reporting access.
  • Security Assessment

        Security Assessment Services

      • Architecture Security Review
      • Build Reviews
      • CREST STAR Assessments
      • Data discovery
      • Device Security Reviews
      • External Internet discovery
      • Internal Network Discovery & Mapping
      • Managed Scanning Service (VA)
      • M&A Security Assessment
      • Virtual/Onsite CISO Services
      • OSINT Services
      • Physical Security Audit
      • Network Segmentation Testing
      • Targeted Attack Resistance Assessment
      • Vulnerability Assessment
      • Security Assessment Information
      • What are Build Reviews?
      • What is a Code Review?
      • What is Cyber Security?
      • What is Edge Testing?
      • Useful Pages
      • Apply for corporate account.
      • Talk to a cybersecurity expert.
      • Security Research.
      • ProCheckUp's Engagement Process.
      • Portal access.
      • Reporting access.
  • Incident Response

        Incident Response Services

      • Breach Impact Assessments
      • eDisclosure & eDiscovery
      • Digital Forensics
      • Forensic Readiness Planning
      • Gold Teaming
      • Malware Analysis & Reverse Engineering
      • Intrusion Analysis & Compromise Assessment
      • Incident Response Services
      • Incident Response Retainer
      • Technical Services Counter Measures (TSCM)
      • Forensic First Responder (FFR)
      • Incident Response Information
      • Introduction to Ransomware Protection
      • Stolen Laptop Case Study
      • What is Cyber Security?
      • Useful Pages
      • Apply for corporate account.
      • Talk to a cybersecurity expert.
      • Security Research.
      • ProCheckUp's Engagement Process.
      • Portal access.
      • Reporting access.
  • Sectors

        Sectors

      • Central Government Sector
      • Energy and Utilities Sector
      • Financial Services Sector
      • HealthCare Sector
      • Local Government Sector
      • Manufacturing Sector
      • Retail and E-Commerce Sector
      • Sectors Information
      • CyberSecurity For Energy And Utilities
      • CyberSecurity For Financial Services
      • CyberSecurity For Healthcare
      • Useful Pages
      • Apply for corporate account.
      • Talk to a cybersecurity expert.
      • Security Research.
      • ProCheckUp's Engagement Process.
      • Portal access.
      • Reporting access.
  • About Us
    • Company Information
    • Accreditations
    • News
    • Blog
    • Careers & Team
    • Privacy Policy
    • Anti-Slavery Policy
    • Carbon Reduction Plan
  • Contact

BSides London conference 2016

Home News BSides London conference 2016
Thursday, 9 June 2016

BSides London conference 2016

ProCheckup are main sponsors of BSides London this year

 ProCheckUp presented on bugsweeping (TSCM) to a full house

ProCheckUp also ran a hacking quiz with a "HackRF one" as a prize, which was won by Gordon who scored 83.5%

 

Business
Share on Twitter
Share on Facebook
Share on Google+
Share on Pinterest

Article Author

Recent News

    27 Sept 2017

    Read ProCheckUp’s 'GDPR Bytes' article

    09 Jun 2016

    BSides London conference 2016

    01 Oct 2015

    Want to be a GCHQ spy? Play this game

Authors

  • Cara McGoogan, WIRED
  • Cliff Saran, Computer Weekly
  • Dan Raywood, SC Magazine
  • Karl Flinders, Computer Weekly
  • Michelle Worvell, Professional Broking
  • ProCheckUp, Press Release
  • Richard Brain of ProCheckUp at Search Security
  • Richard Brain, ProCheckUp at Test Magazine
  • Ron Condon, Search Security
  • SC Staff, SC Magazine
  • Warwick Ashford, Computer Weekly
  • Search Security
  • Ron Condon, TechTarget
  • Mirko Zorz, net-security.org

ProCheckUp Ltd are a privately founded Information Security company specialising in Security Assessment/Penetration Testing, Compliance, Threat Intelligence as well as Forensics & Incident Response.

Useful Links

  • Careers
  • FAQs
  • Privacy Policy
  • Anti-Slavery Policy

Latest News

October 29

Read ProCheckUp’s 'GDPR Bytes' article

October 29

BSides London conference 2016

Contact Us

ProCheckUp14 & 15 St. George’s Square, Portsmouth, PO1 3EZ
+44 (0) 20 7612 7777
info@procheckup.com