Refracted Security’s cover photo
Refracted Security

Refracted Security

Information Technology & Services

Lier, Antwerp 519 followers

World class digital safety made accessible

About us

Like refraction shows all facets of light, we break up your security into manageable components.

Website
https://www.refracted.eu
Industry
Information Technology & Services
Company size
11-50 employees
Headquarters
Lier, Antwerp
Type
Privately Held
Founded
2021
Specialties
Red Teaming, OSINT, Pentesting, Incident Response, and Vulnerability Management

Locations

Employees at Refracted Security

Updates

  • ✅ 𝐓𝐚𝐛𝐥𝐞𝐭𝐨𝐩 𝐄𝐱𝐞𝐫𝐜𝐢𝐬𝐞𝐬 (𝐂𝐒𝐈𝐑𝐓 + 𝐂𝐌𝐓) "Can your teams lead through a crisis technically and strategically?" 👉 𝐂𝐲𝐛𝐞𝐫 𝐢𝐧𝐜𝐢𝐝𝐞𝐧𝐭𝐬 𝐡𝐚𝐩𝐩𝐞𝐧 𝐰𝐡𝐞𝐧 𝐲𝐨𝐮 𝐥𝐞𝐚𝐬𝐭 𝐞𝐱𝐩𝐞𝐜𝐭 𝐭𝐡𝐞𝐦. When they do, your technical teams and executive leadership need to act in complete coordination. That level of teamwork does not happen by accident; it is trained, rehearsed, and continuously refined. 𝐖𝐡𝐚𝐭: Our combined CSIRT and CMT Tabletop Exercises simulate realistic cyber attack scenarios that test both technical response and executive decision-making. CSIRT exercises focus on detection, containment, and response, while CMT exercises guide leadership through communication, legal considerations, and reputational impact. 𝐖𝐡𝐞𝐧: These exercises are most valuable before disaster strikes. Conduct them before major transformations, audits, onboarding key personnel, or simply as part of your annual readiness plan. Regular practice ensures your teams are prepared for the unexpected. 𝐇𝐨𝐰: We lead your teams through tailored attack simulations that reflect your environment and risks. By practicing together, your organization builds muscle memory from the SOC floor to the boardroom, ensuring everyone knows their role and how to execute it under pressure. 🛠️ 𝐃𝐨 𝐲𝐨𝐮 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐭𝐫𝐚𝐢𝐧 𝐲𝐨𝐮𝐫 𝐩𝐞𝐨𝐩𝐥𝐞 𝐭𝐨 𝐩𝐞𝐫𝐟𝐨𝐫𝐦 𝐜𝐨𝐧𝐟𝐢𝐝𝐞𝐧𝐭𝐥𝐲? Tabletop exercises turn theory into action and uncertainty into structured response. Your teams will know what to do, how to do it, and how to lead when it matters most. 𝘓𝘦𝘵'𝘴 𝘣𝘶𝘪𝘭𝘥 𝘳𝘦𝘴𝘪𝘭𝘪𝘦𝘯𝘤𝘦 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳. #TabletopExercise #CSIRT #CMT #IncidentReadiness

  • Refracted Security reposted this

    Beste vrienden, De datum van dé nederlandstalige cybersecurity hoogmis nadert met rasse schreden. Hoog tijd dus om wat meer details op jullie los te laten aangaande het programma. Zoals jullie ondertussen wel weten verzorgen we op 22/10 twee paralelle tracks. Eentje voor de suits (onze beleids & beheer track) en ééntje voor de hoodies (onze bits & bytes track). Bezoekers die zich willen wagen aan onze beleids & beheer track kunnen zich dit jaar aan hetvolgende verwachten: ❤️🔥 Manon Verdiesen zal het over mentale weerbaarheid hebben en ons de middelen aanreiken om mentaal sterker die eventueel toekomstige digitale crisissituatie aan te vatten en door te komen. ❤️🔥 Björn V. en Tom De Laet nemen ons door een realistische incident response table top oefening. Ze maken daartoe gebruik van het Backdoors & Breaches kaartspel van Black Hills Information Security. Iedere deelnemer zal trouwens "veur de veurniet" een exemplaar mee naar huis kunnen nemen. ❤️🔥 Met al die regelgeving weet zelfs een security leader het bijna niet meer. Marilyn. Vandermarliere Vandermarlie schept opnieuw duidelijkheid in de lettersoep. ❤️🔥 Wendy Roodhooft en Masja Kinsbergen komen toelichten hoe zij hard werken aan een betere beveiliging van de zorgsector, een traditioneel moeilijke sector wanneer het over cybersecurity gaat, maar die van enorm maatschappelijk belang is. ❤️🔥 Iwona M. kijkt samen met ons even in de spiegel en brengt een haarfijne analyse van de rol van de security leader doorheen de jaren. We kijken naar verleden, heden en toekomst. ❤️🔥 Zijn die big tech "lokale" data centers nu een veilige haven of niet? Fleur 🎙🦊 van Leusden werpt haar steevast kritische blik op de materie. Als dit maar niet in kipkap eindigt. Wat een weelde alweer! Het moge duidelijk zijn, indien u nog niet ingeschreven bent voor 22/10 is het hoog tijd om dat alsnog te doen. 👉 Registreren is volledig gratis en doe je via https://lnkd.in/eRckhKh2. Hou onze socials in de gaten want dra gaan we meer in detail aangaande onze bits & bytes track zodat we ook onze hoodies warm krijgen. Wij willen tenslotte onze partners danken om ons alweer financieel bij te staan om jullie dit alles gratis en voor niets te kunnen aanbieden. Zij zullen op 22/10 allemaal aanwezig zijn. Kom hen begroeten en ontmoeten. Astrea Law Cloudflare Data Protection Institute Elastic Exabeam Fortra Fox-IT ISACA Belgium Chapter Jarviss Outpost24 Benelux (ex-Sweepatic) PwC Belgium Refracted Security SAI SentinelOne Upright Security Vinçotte #annacon #effectief250 #cybersecurity #informatiebeveiliging

    • No alternative text description for this image
  • ✅ 𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 "No alerts. No signs. But are you sure no one is inside?" 👉 𝐂𝐲𝐛𝐞𝐫 𝐚𝐭𝐭𝐚𝐜𝐤𝐞𝐫𝐬 𝐚𝐫𝐞 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐦𝐨𝐫𝐞 𝐬𝐤𝐢𝐥𝐥𝐞𝐝 𝐚𝐭 𝐬𝐭𝐚𝐲𝐢𝐧𝐠 𝐡𝐢𝐝𝐝𝐞𝐧. Threat Hunting is the proactive way to find them before they strike and cause damage. 𝐖𝐡𝐚𝐭: Our Threat Hunting service looks for signs of compromise across your network even when there are no alerts. We combine threat intelligence, behavior analytics, and forensic methods to identify subtle anomalies and hidden threats. This is about discovering the intruders that are already inside but have not yet revealed themselves. 𝐖𝐡𝐞𝐧: We act immediately after a peer is compromised, when zero-day vulnerabilities are disclosed, or as part of a mature threat detection strategy. The goal is to catch threats early and prevent attackers from moving laterally or stealing sensitive data. 𝐇𝐨𝐰: Our team examines logs, anomalies, and indicators of compromise to detect stealthy behavior and dormant threats. If needed, we activate your Incident Response plan without delay, minimizing risk and exposure. We provide visibility into what your current security systems might have missed. 🔎 𝐑𝐞𝐚𝐝𝐲 𝐭𝐨 𝐮𝐧𝐜𝐨𝐯𝐞𝐫 𝐭𝐡𝐞 𝐢𝐧𝐬𝐢𝐝𝐞𝐫 𝐭𝐡𝐫𝐞𝐚𝐭𝐬 𝐡𝐢𝐝𝐝𝐢𝐧𝐠 𝐢𝐧 𝐲𝐨𝐮𝐫 𝐧𝐞𝐭𝐰𝐨𝐫𝐤? Let us help you find what cannot be seen and strengthen your defenses before attackers have the chance to strike. 𝘓𝘦𝘵'𝘴 𝘣𝘶𝘪𝘭𝘥 𝘳𝘦𝘴𝘪𝘭𝘪𝘦𝘯𝘤𝘦 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳. #ThreatHunting #ProactiveSecurity #CyberResilience

  • ✅ 𝐕𝐈𝐏 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 "Executives are targets, 𝘦𝘴𝘱𝘦𝘤𝘪𝘢𝘭𝘭𝘺 in their own homes." 👉 𝐘𝐨𝐮𝐫 𝐥𝐞𝐚𝐝𝐞𝐫𝐬𝐡𝐢𝐩 𝐢𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐟𝐫𝐨𝐧𝐭 𝐥𝐢𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫 𝐫𝐢𝐬𝐤. This week's topic is VIP Security: The protection that follows your executives beyond the office walls. C-suite members access sensitive data from homes, hotels, and airports. But are their personal networks and devices as secure as the corporate environment? 𝐖𝐡𝐚𝐭: Our VIP Security service safeguards high-risk executives by securing home networks, personal devices, and their digital footprint. It’s designed to protect both the individual and the organisation, with solutions tailored to their lifestyle and role. 𝐖𝐡𝐞𝐧: Anytime executives work remotely, travel often, or are publicly visible in critical sectors such as finance, energy, or logistics. These moments create unique vulnerabilities that require specialised attention. 𝐇𝐨𝐰: We conduct discreet OSINT scans, in-person home security assessments, and provide privacy-respecting coaching on safe digital habits. The focus is on strengthening defences without crossing personal boundaries, so leaders can work confidently wherever they are. 🔐 Are your most valuable people fully protected where they’re most exposed? Let's close the gap between the boardroom and the living room. And, as always: 𝘓𝘦𝘵’𝘴 𝘣𝘶𝘪𝘭𝘥 𝘳𝘦𝘴𝘪𝘭𝘪𝘦𝘯𝘤𝘦 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳. #ExecutiveProtection #VIPSecurity #RemoteWorkSecurity

  • Yesterday ANNACON kicked off their very first COMMAND & ANNACONQUER, and what an incredible evening it turned out to be! A packed room, Hack The Box challenges, pizza, drinks, and plenty of late-night knowledge-sharing. 🍕💻🍻 The atmosphere was buzzing with curiosity and collaboration: from first-timers to seasoned hackers, everyone learned something new and had fun along the way. We at Refracted Security were happy to help host the event, made possible thanks to De Kwekerij Lier, who kindly provided the space. 🙌 Huge thanks to ANNACON for putting together such a great initiative and to everyone who showed up and made it such a memorable night. #annacon #cybersecurity #infosec

    View organization page for ANNACON

    1,065 followers

    Beste vrienden, Gisterenavond vond onze eerste COMMAND & ANNACONQUER in De Kwekerij Lier plaats. Onze bedoeling was in de eerste plaats, zoals steeds, om de cybersecurity community samen te brengen en een leuke en leerrijke avond te beleven. En we zijn daar volgens de eerste reacties absoluut in geslaagd. Thomas Hayen had als ambassadeur van Hack The Box een omgeving voor ons klaargestoomd waar we ons heel de avond in hebben kunnen uitleven. Geflankeerd door Pieter D. hebben beide heren ons gezamenlijk door het gebruikelijke denkproces van een aanvaller geleid dat toegepast wordt om in IT systemen binnen te dringen. Dit alles gecombineerd met de nodige tips voor de blauwe kant en discussies rond het heimelijke karakter van bepaalde technieken. Zoals steeds nemen we de geleerde lessen uit deze eerste editie mee om een nog betere editie te bouwen. Opvallende fact van deze editie: 100% opkomst. Jawel, de 30+ personen die zich hadden ingeschreven zijn allemaal opgedaagd. Waarvoor dank! Gratis en opkomst? Hoe blijven we dat toch doen? Tenslotte willen we onze partner van het eerste uur, Refracted Security, die hier zijn brede schouders mee heeft onder gezet, hartelijk danken. Merci Ben Van Erck, Stijn Horemans, Yannick Hendrickx en de rest van jullie team. Jullie onvoorwaardelijke steun maakt dit soort evenementen mogelijk. Blijf ons volgen voor meer nieuws omtrent C&AC 002! #annacon #cenac #informatiebeveiliging #cybersecurity #htb #effectief250

    • No alternative text description for this image
  • ✅ 𝐈𝐧𝐜𝐢𝐝𝐞𝐧𝐭 𝐑𝐞𝐬𝐩𝐨𝐧𝐬𝐞 𝐏𝐥𝐚𝐧𝐧𝐢𝐧𝐠 "You can’t improvise your way through a cyber crisis." 👉 𝐏𝐫𝐞𝐩𝐚𝐫𝐚𝐭𝐢𝐨𝐧 𝐢𝐬 𝐩𝐫𝐢𝐜𝐞𝐥𝐞𝐬𝐬 𝐰𝐡𝐞𝐧 𝐜𝐡𝐚𝐨𝐬 𝐡𝐢𝐭𝐬. This week, we’re focusing on Incident Response Planning: The blueprint that keeps your organisation calm, coordinated, and effective when the unexpected happens. Without a plan, a breach can spiral into missed steps, costly downtime, and panicked decisions. With the right plan, you move with precision. 𝐖𝐡𝐚𝐭: We co-develop a clear, customised, and tested IR plan mapping who does what, what gets reported, and how systems are restored. It’s not just a compliance document. It’s a living playbook aligned with NIST or NIS2 standards, ready for real-world execution. 𝐖𝐡𝐞𝐧: Before the breach. The time you invest in preparation saves hours, money, and reputations during a crisis. An untested plan is a gamble you can’t afford. 𝐇𝐨𝐰: Through role assignments, response playbooks, tabletop exercises, and mapping third-party dependencies, we build a plan that works under pressure. When an incident happens, your team knows exactly what to do, who to call, and how to recover. 📋 Is your incident plan battle-tested... or just box-ticked? 𝘓𝘦𝘵'𝘴 𝘣𝘶𝘪𝘭𝘥 𝘳𝘦𝘴𝘪𝘭𝘪𝘦𝘯𝘤𝘦 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳 #IncidentPlanning #CyberReadiness #BreachResponse

  • “𝐓𝐨 𝐭𝐡𝐞 𝐰𝐨𝐦𝐞𝐧 𝐰𝐡𝐨 𝐚𝐥𝐰𝐚𝐲𝐬 𝐤𝐧𝐞𝐰 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 ... 𝐞𝐱𝐜𝐞𝐩𝐭 𝐭𝐡𝐞 𝐖𝐢𝐅𝐢 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.” Most of us spent years teaching our moms how to: - Restart the router - “Double-click” (not just click harder) - Plug in the HDMI properly - And yes, spot that very obvious scam email But that’s just the tech. She taught us the really important things, like intuition, boundaries, and how to recognize a situation that just doesn’t feel right. (𝘞𝘩𝘪𝘤𝘩, 𝘩𝘰𝘯𝘦𝘴𝘵𝘭𝘺, 𝘪𝘴 𝘩𝘢𝘭𝘧 𝘰𝘧 𝘤𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘢𝘯𝘺𝘸𝘢𝘺.) At Refracted, we build smart systems. But our instincts? We learned those from mom. Happy Mother’s Day to the women who don’t always know the tools, but always know what matters. #MothersDay #ThinkRefracted #CyberInstincts

    • No alternative text description for this image
  • ✅ 𝐈𝐧𝐜𝐢𝐝𝐞𝐧𝐭 𝐑𝐞𝐬𝐩𝐨𝐧𝐬𝐞 𝐇𝐨𝐭𝐥𝐢𝐧𝐞 "Who do you call when it all goes wrong?" 👉 𝐓𝐢𝐦𝐞 𝐢𝐬 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 𝐝𝐮𝐫𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫 𝐜𝐫𝐢𝐬𝐢𝐬. This week, we’re talking about Incident Response. When ransomware hits, data leaks, or suspicious activity threatens your operations, you don’t have time to hesitate. You need expert help—immediately. 𝐖𝐡𝐚𝐭: Our Incident Response Hotline is your 24/7 lifeline to experienced cybersecurity experts. We’re not talking about generic IT support. This is real-time, battle-tested guidance through ransomware, data breaches, phishing, insider threats, and other high-impact events. One call gets you connected to professionals who know how to stabilize chaos and guide recovery under pressure. 𝐖𝐡𝐞𝐧: You already have a solid IT team—but what happens when the situation goes beyond their scope? That’s when the hotline becomes essential. Whether you’re unsure about next steps, dealing with a live breach, or need urgent advice on backup, containment, or legal coordination, we’re here. It’s also a valuable safety net post-incident—helping you respond confidently to questions from leadership, regulators, or customers. 𝐇𝐨𝐰: It starts before the breach. We help you build readiness with custom playbooks, tabletop exercises, and integration with legal and compliance stakeholders. Then when an actual incident strikes, it’s just one call. Our team guides you through containment, investigation, response, and recovery—with clarity, speed, and experience. 📞 Want to know how fast your team could activate the hotline? Run a test. See how fast the response kicks in. Because when the real thing happens, every second matters. 𝘓𝘦𝘵'𝘴 𝘣𝘶𝘪𝘭𝘥 𝘳𝘦𝘴𝘪𝘭𝘪𝘦𝘯𝘤𝘦 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳 #IncidentResponse #CyberCrisis #SecuritySupport #AlwaysOn #BreachResponse #IRPlanning

Similar pages