What happens in cyberspace, may affect the whole company. How to get prepared for the ever-changing cyber-attacks?

Ethical hacking tests your resilience even before the real attack. Today, we need to continuously measure the level of application security as well as the level of security from the external and public networks and verify user readiness.

Risk assessment is a necessity. Knowing and controlling the risks that threaten your assets should be a part of a comprehensive and functional cybersecurity solution.

Keep up with social engineering methods because it only takes one unaware worker and a fraudulent phone call to get you into trouble.

Need to be sure?
Let us check your security.

Our successful projects

speak for themselves

PPF Banka

We have developed a risk assessment and management model above ISO, EBA, and Cybersecurity Act standards for a bank specializing in private and corporate banking.

ČSOB Leasing

Our team of security experts takes care of complex issues related to the security of the bank's IT infrastructure, from technical solutions to raising awareness of potential threats.


We are in charge of identity management and we have also merged the T-Mobile system with the Slovak Telecom system within identity management.

Komerční Banka

As part of our security consulting services, we assist with day-to-day security and analysis of cybersecurity trends and news.

Trask and its team of IT security experts have been our partner for over 15 years and I have always been able to rely 100% on their expertise and delivery.

Petr Froňek
Security Manager, ČSOB Stavební spořitelna

There are lots of topics in cyberspace. See where we can help you with security.

Penetration Tests

A method of assessing the security of systems, applications, or infrastructure components. It is performed by testing, and simulating possible attacks on the system from both inside and outside. The entire process involves a detailed analysis of the system, focusing on potential security weaknesses resulting from faulty system settings, known or unknown hardware and software flaws, or inadequate functional countermeasures.

Vulnerability Management

Vulnerability management is the continuous, regular process of identifying, assessing, prioritizing, reporting, managing and remediating cyber vulnerabilities across all IT systems.  The security team will typically use vulnerability management tools to detect vulnerabilities. Processes for mitigating them are also included.

Identity Management

Identity management (IdM) or also identity and access management (IAM or IdAM) is a group of policies and technologies that ensure that the right users are given appropriate access to technology resources.

Privilege Identity Management

Focuses on shared accounts across the environments used in company systems. Privileged shared accounts are a risk area in terms of permissions and lack of connection to a specific responsible user. For this reason, ensuring the life cycle of these identities is an essential for us and our customers. The impact of misusing these accounts can be fatal.

IT Risk Assessment

Is the discipline that serves and addresses the identification of threats to IT projects and IT assets. In relation to cybersecurity, its aim is to ensure that data in information systems are protected from theft, misuse, unauthorized modification, or inaccessibility.

Social Engineering

This area is used in cyber security to examine mainly the user part. In particular, human interaction, psychological manipulation, and malingering are used to induce a security vulnerability and identify potential information leakage.

We do not reinvent the wheel

We combine IT with deep expertise in Finance, Insurance, Energy, and Automotive.

We are continuously monitoring changing cyber attack vectors and know where vulnerabilities can be found in companies. Our expertise doesn't just stop at security, in addition to ensuring maximum security of IT systems and company data, we also have the remit to ensure that business runs smoothly and that all employees are comfortable working in an environment whilst being aware of the risks.

Martin Bareš
Security Consultant

Talk to our experts on cybersecurity

Tomáš Sikora

Cybersecurity Manager

+420 602 751
Martin Bareš

Security Consultant

+420 725 544
Pavel Koza

Delivery Manager & Solution Architect

+420 777 135