By sending your data you allow us to use it to resolve your doubts by sending you commercial information of interest. We will delete it when they are no longer necessary for this matter. Know your rights in our Privacy Policy.
14 - May 2018
Four days, three talks, two congresses, one goal.

Sharing knowledge for a more cybersecure world.

It has been an intense few days for the jtsec team, but tremendously rewarding at the same time and, why not, fun as well. Four days to lecture in two congresses with one single goal! To improve cybersecurity in the IT systems.

read more
24 - April 2018
Hardware Hacking and ARM Reverse Engineering training

Attacking embedded security devices and IoT hardware using baremetal reversing

Successful completion of the first edition of our custom Hardware Hacking and Reverse Engineering training! In this way, we open a new series of customized trainings focused on basic and intermediate level attacks applied to security hardware and IoT devices.

read more
5 - April 2018
STIC product catalogue (CPSTIC)

Regulating the acquisition of IT products in the administration

One of our goals when we created jtsec was to make our contribution to increasing the awareness and knowledge on cybersecurity on the companies within our sector. Because of that, we have invested a great deal of time in preparing courses that adapt to what each of our clients need to know.

read more
12 - Febr 2018
Common Criteria Training in Kuala Lumpur (Malaysia)

Our training experience in Malaysia

One of the objectives in creating jtsec was to support companies to increase their cybersecurity knowledge. For this reason, we have invested a large part of our time in preparing trainings that cover the knowledge needs of our clients.

read more
23 - Jan 2018
NIS Directive and Spanish National Security Scheme (ENS)

NIS Directive, its application to Spanish National Security Scheme (ENS), and Spanish National Critical Infrastructure Catalogue (CNPIC)

In the last few years, certain areas of activity or infrastructure which provide essential services, of vital relevance for the continuity of state functioning, have become the target of numerous attacks. It is hard to miss that there is a strong dependency over certain infrastructures whose interruption or destruction would have a huge impact on the health, security and economic wellbeing of the citizens. Such infrastructures have become a high-priority target for state security strategies, materializing the concept of critical infrastructure

read more