Are you ready to protect your products against the threats of the future?


So, why is product security of any interest to you? Because technology is now becoming better and better and cyber-attacks present a growing threat to businesses and individuals. To protect our businesses and critical data strong cryptographic protection in every device and application is more than needed.

Meet our partner and ‘NAVY SEALS’ of product security. CYBERCRYPT have a total of 4 specialized product security teams that are working together to help customers elevate their products’ security posture.

What will you discover
in just 45 min.?

– Security Priorities at the Board Level
– CYBERCRYPT – Expertise Areas
– Threat Picture
– Encryptonize – Data Protection for Cloud Workloads
– Blackbox Analysis (reverse engineering) Surprise
– Q&A

Whether you believe your product and IP is sufficient protected or not the topics of this webinar will be relevant to you.

Oh no, event registration is closed!
Sign up for news about future events!

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    cybercrypt - wavy lines - 1


    Peter Jerry
    Peter Jerry is the Chairman and COO of CYBERCRYPT and has been with the company from the start in 2017. He studied at CBS, INSEAD and Wharton Business School and have degrees in International Marketing and Strategic Management. He had positions as CEO of France Telecom Denmark and Orange Business Services in the Nordics, Cisco Denmark and EADS Denmark and has worked in product and business management roles for Alcatel, Huawei, Cannon and GN Great Nordic. His primary focus and knowledge is Business Strategy in technology-savvy companies.
    cybercrypt - FG circle - 2
    Frederik Gottlieb is heading up CYBERCRYPT’s product division building secure products for the cloud. With more than 20 years of experience building and leading software development in companies like SimCorp and Agoda, he is today focused on how to protect data for cloud workloads. Frederik’s interest in cloud comes from the highly difficult task of managing the right balance of product features, security, and usability to build the best possible secure products.
    cybercrypt - EM circle - 3
    Esben Mogensen has been working for a decade within information security & product security. His main goal has always been to match companies needs with the right experts and technology. This has turned out to be a successful path and has improved the security posture of many companies.
    visit cybercrypt’s website
    CYBERCRYPT’s Product Security Teams

    Security for embedded software and devices

    In-app protection and app shielding

    Backend & cloud security


    IoT, edge computing, smarthome, medical, automotive, automation, etc. Within this team, we employ several white-hat “hackers”. They are also part of a prominent CTF team in Germany that is among top 10 in the world and organises its own highly acclaimed CTF competition annually.

    Code obfuscation as well as anti-dynamic and anti-symbolic countermeasures to protect your Intellectual Property inside a mobile app or any other application. Here we rely on our bespoke software technology for in-app protection. We also have tools and capabilities for reverse-engineering and binary analysis.

    Design and implementation of security architecture for the workloads in a cloud environment, data security in the cloud, DevSecOps, Kubernetes security, container etc. In the part of data security in the cloud, we base on our bespoke software technology called Encryptonize for application-layer encryption, which will be suitable for any cloud.

    Expertise in cryptography across all these 3 areas above is a major differentiator that separates us from most companies in the world providing services within secure product development. Indeed, we have professors and cryptographic PhD on our payroll to deal with a problem of any complexity level in this field, from lightweight cryptography for low-resource embedded devices all the way to post-quantum publickey cryptography to thwart the threat constituted by emerging quantum computers that would render all the currently used public-key cryptography insecure.