Skip to content
@Hack23

www.hack23.com

Swedish innovation hub specializing in creating immersive and fun game experiences and expert cybersecurity consulting

🔒 Hack23 AB

Swedish innovation hub specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting and solutions.

🔥 Black Trigram (흑괘)

Black Trigram Logo

Realistic 2D precision combat simulator inspired by traditional Korean martial arts, focusing on precise anatomical targeting, authentic combat techniques, and detailed physics-based interactions.

🔐 CIA Compliance Manager

CIA Compliance Manager Logo

Security assessment platform for the CIA triad (Confidentiality, Integrity, Availability) with business impact analysis and compliance mapping to regulatory frameworks like NIST, ISO, GDPR, HIPAA, and SOC2.

🔍 Citizen Intelligence Agency

CIA Logo

Political transparency platform monitoring Swedish political activity with data-driven insights, analytics, dashboard visualizations, and accountability metrics.

☁️ Lambda in Private VPC

AWS Lambda

Enterprise-grade multi-region active/active architecture with near-zero recovery time, comprehensive DNS failover, and AWS Resilience Hub policy compliance for mission-critical applications.

🧪 Sonar-CloudFormation-Plugin

SonarQube Plugin

SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards.

🔑 Security Services

Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.


📋 Service Overview

🌐 Availability Remote or in-person (Gothenburg)
💰 Pricing Contact for pricing
🏢 Company Hack23 AB (Org.nr 5595347807)
📧 Contact LinkedIn

🎯 Core Service Areas

Area Services Ideal for
🏗️ Security Architecture & Strategy Enterprise Security Architecture: Design and implementation of comprehensive security frameworks
Risk Assessment & Management: Systematic identification and mitigation of security risks
Security Strategy Development: Alignment of security initiatives with business objectives
Governance Framework Design: Policy development and security awareness programs
Organizations needing strategic security leadership and architectural guidance
☁️ Cloud Security & DevSecOps Secure Cloud Solutions: AWS security assessment and architecture (Advanced level)
DevSecOps Integration: Security seamlessly integrated into agile development processes
Infrastructure as Code Security: Secure CloudFormation, Terraform implementations
Container & Serverless Security: Modern application security best practices
Development teams transitioning to cloud-native architectures with security focus
🔧 Secure Development & Code Quality Secure SDLC Implementation: Building security into development lifecycles
CI/CD Security Integration: Automated security testing and validation
Code Quality & Security Analysis: Static analysis, vulnerability scanning
Supply Chain Security: SLSA Level 3 compliance, SBOM implementation
Development teams seeking to embed security without slowing innovation

🏆 Specialized Expertise

Category Services Value
📋 Compliance & Regulatory Regulatory Compliance: GDPR, NIS2, ISO 27001 implementation
ISMS Design & Implementation: Information Security Management Systems
AI Governance: Emerging AI risk management frameworks
Audit Preparation: Documentation and evidence preparation
Navigate complex regulatory landscapes with confidence
🌐 Open Source Security Open Source Program Office: OSPO establishment and management
Vulnerability Management: Open source risk assessment and remediation
Security Tool Development: Custom security solutions and automation
Community Engagement: Open source security best practices
Leverage open source securely while contributing to security transparency
🎓 Security Culture & Training Security Awareness Programs: Building organization-wide security culture
Developer Security Training: Secure coding practices and methodologies
Leadership Security Briefings: Executive-level security understanding
Incident Response Training: Preparedness and response capability building
Transform security from barrier to enabler through education and culture

💡 Why Choose Hack23 Security Services?

Three decades of hands-on experience in software development and security architecture means we understand the real challenges development teams face. We don't just point out problems—we provide practical, implementable solutions that enhance security without slowing down innovation.

Our approach: Security should be seamlessly integrated into your existing processes, not bolted on afterward. We help organizations build a culture of security awareness where protection becomes a natural part of how teams work, not an obstacle to overcome.

Passionate about transparency: As advocates for open source security, we believe in sharing knowledge and building community. Our solutions are designed to be understandable, maintainable, and aligned with industry best practices.

🏛️ CIA Compliance Manager Documentation

Current Architecture

Future Vision

🏛️ Citizen Intelligence Agency Documentation

Current Architecture

Future Vision & Operations

🔑 Security Focus Areas

%%{
  init: {
    'theme': 'base',
    'themeVariables': {
      'primaryColor': '#d1c4e9',
      'primaryTextColor': '#1a1a1a',
      'primaryBorderColor': '#9575cd',
      'lineColor': '#9575cd',
      'secondaryColor': '#c8e6c9',
      'tertiaryColor': '#bbdefb'
    }
  }
}%%
mindmap
  root((CIA Triad<br>Security Focus))
    Confidentiality
      ::icon(fa fa-lock)
      Data Classification
        ::icon(fa fa-tag)
        Public
        Restricted
        Confidential
        Secret
      Access Control
        ::icon(fa fa-shield)
        RBAC Implementation
        MFA Integration
        Least Privilege
      Encryption
        ::icon(fa fa-key)
        AES-256
        Quantum-Safe Encryption
        KMS Integration
    Integrity
      ::icon(fa fa-check-circle)
      Data Validation
        ::icon(fa fa-check)
        Manual Checks
        Automated Validation
        Blockchain Records
      Change Control
        ::icon(fa fa-history)
        Audit Trails
        Versioning
        Non-Repudiation
      Quality Assurance
        ::icon(fa fa-certificate)
        Code Analysis
        Test Coverage
        SLSA Level 3
    Availability
      ::icon(fa fa-clock-o)
      Resilience Levels
        ::icon(fa fa-line-chart)
        Backup/Restore
        Pilot Light
        Warm Standby
        Multi-Site Active/Active
      Recovery Metrics
        ::icon(fa fa-tachometer)
        RTO Targets
        RPO Objectives
        Uptime SLAs
      Monitoring
        ::icon(fa fa-eye)
        Health Checks
        Alerting
        Chaos Testing
Loading

🌟 Featured in Press & Media

🗞️ Computer Sweden

Featured article on innovative use of technology for political transparency

Read Article

📰 Riksdag och Departement

Coverage on Citizen Intelligence Agency's monitoring capabilities

Read Article

📊 National Democratic Institute

Recognized in survey of parliamentary monitoring organizations

View Report

🎤 Technical Talks & Presentations

🎙️ Javaforum Göteborg

Presentation on secure architecture patterns

Watch Presentation

🎙️ Shift Left Like A Boss

Security podcast guest appearance discussing DevSecOps

Listen to Podcast

💼 About James Pether Sörling

%%{
  init: {
    'theme': 'base',
    'themeVariables': {
      'primaryColor': '#a0c8e0',
      'primaryTextColor': '#1a1a1a',
      'primaryBorderColor': '#86b5d9',
      'lineColor': '#86b5d9',
      'secondaryColor': '#c8e6c9',
      'tertiaryColor': '#ffda9e'
    }
  }
}%%
mindmap
  root((James Pether<br>Sörling))
    Security Architecture
      ::icon(fa fa-lock)
      CIA Triad Implementation
      Zero Trust Architectures
      AWS Security Services
      Compliance Frameworks
        NIST 800-53
        ISO 27001
        GDPR
    Cloud Engineering
      ::icon(fa fa-cloud)
      Multi-Region Architectures
      Resilience Engineering
      Private VPC Security
      CloudFormation/Terraform
    Software Development
      ::icon(fa fa-code)
      Java & Spring
      React & TypeScript
      PostgreSQL
      CI/CD Automation
    Open Source Leadership
      ::icon(fa fa-github)
      CIA Compliance Manager
      Citizen Intelligence Agency
      Sonar-CloudFormation-Plugin
      cfn-nag Contributor
Loading

Experienced technology professional specializing in information security and delivery of secure cloud systems. Strong advocate for transparency in organizations and committed to ensuring robust security posture for modern applications through open source solutions.

📫 Connect

LinkedIn GitHub Blog Tech Talks

Last updated: 2025-05-13 08:23:39

Pinned Loading

  1. cia cia Public

    Comprehensive open-source intelligence platform analyzing Swedish political activities using AI and data visualization. Tracks politicians, government institutions, and parliamentary data, offering…

    Java 177 47

  2. sonar-cloudformation-plugin sonar-cloudformation-plugin Public archive

    Sonarqube cloudformation plugin, IaC security supports cfn-nag/checkov

    Java 26 9

Repositories

Showing 10 of 14 repositories

Top languages

Loading…

Most used topics

Loading…