"It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it" - Stephane Nappo

Who we are


We are an independent consulting team that provides a range of cybersecurity solutions that assess cybersecurity-related risks, detect and handle security breaches, protect customers, and help them respond to security incidents. We have expertise in most enterprise and consumer technology, from hardware to sophisticated targeted attack simulations. To meet today's security challenges and service expectations, we have combined the best technologies with robust processes and expert people who understand the dark side of cyber-security world-building cohesive, end-to-end capabilities that control cyber risk and drive more value from security spending.

To effectively solve complex cybersecurity problems requires unique skill-sets and dedication. Our team combines technical excellence and passion for cybersecurity. All our analysts have corporate IT experience and meet the highest standards of confidentiality and discretion. Cyber Composites works alongside our clients to develop a comprehensive understanding of their strategic requirements within the cybersecurity context. Our service approach challenges traditional industry methods, we think and operate outside of the box. We are a research-led technical cybersecurity consultancy.

Many companies find it difficult to understand what exactly comprises adversary-focused services (breach assessments, red team and hunt operations, penetration tests, etc.)

  • How comprehensive is the service?
  • What capabilities and methodologies are being utilized?
  • Will the service be useful in informing the organization long-term in combating the cyber threat?

To be blunt, the information security industry has traditionally not looked to provide satisfactory answers to these questions or enable customers to improve their own defensive capabilities. To combat the uncertainty surrounding cyber-security consultancy services, we are committed to full transparency before during, and after our engagements and all our service offerings. We share our Tactics, Techniques, and Procedures (TTPs), operational methodologies, and technical capabilities freely in the knowledge that your team will become proficient to help your organization with maturing its threat detection, response, and hardening capabilities.

We try to stand out from the rest of the industry, in all services we provide.

Follow Us