 We're here at the ITU studio in Geneva and I'm very pleased to be joined by Ilya Koleshenko, who is CEO of High Tech Bridge. High Tech Bridge is a leading information security and penetration testing company headquartered in Geneva in Switzerland. In 2012, High Tech Bridge was recognized as one of the market leaders and best service providers in the ethical hacking industry by Frost and Sullivan Market Research. Ilya Koleshenko, thank you very much indeed for being with us today. Thank you very much for your invitation. I'd like to start off by asking you if you can tell us a little bit about High Tech Bridge and about the business of ethical hacking. Sure. Actually, High Tech Bridge is a Swiss company specialized in ethical hacking that exists since 2007. Probably we should explain a little bit more in details about ethical hacking because despite the industry of ethical hacking exists since 2001, basically we can say. A lot of people still ask what is the difference between ethical hackers, hackers, criminal hackers, who are these guys, what are they doing, what is their business. Actually to make the story short, we can say that today a lot of companies have their IT services, IT infrastructures like hosting, websites, VIFI networks and so on. A lot of companies know that security is something that is very important for them and they have antivirus, firewalls, IDS, IPS and all things like that. Ethical hacking is a very interesting business actually. We are hired by the customer who tell us, for example, I have a site that is supposed to be secure because I have a firewall, web application firewall, it's supposed to be on a hosting that is secure but I'd like to hire you guys to legally with my permission to hack the website and show me if everything is indeed secure and if you are going to hack my website I'd like to know how you did it and the most important thing, what are the solutions to be secure in the future. So can I ask you, how does High Tech Bridge provide assessments and offer security solutions to clients faced with many different kinds of hacking perpetuated by hackers with different motivations? Of course. Actually it's a question that a lot of customers who are contacting us are actually asking us because they'd like to know how to proceed, what are the norms, what are the processes and so on. Usually the process of ethical hacking is quite simple. The customer is coming to us and saying that he has, for example, a server, an IT infrastructure website or something like this and he says, I'd like to know if it's hackable or not. Then during the discussion with the customer we're going to say to him about potential risks he might have. We're going to speak about the competition. We're going to speak about hackers who are doing hacking just for fun to make some noise, some buzz on the medias. We're going to speak, obviously, about hackers attacks that may come from the company itself, from the insiders, because today a lot of companies actually being hacked, we can say, about their own employees. And after the customer actually going to say, you know, about insider, I'm quite confident with my team because the team is relatively small and the people who I have, I tend to trust them. The competition, I also don't think that we're going to be attacked by them because the competition, we know them or we have a great relations with them. But for example, the risk of being hacked by some hacking groups for economical reasons, political reasons or something like this, this is something I really would like to foreseeing. And can you suggest me an attacking scenario that these potential hacking groups will use? How does Hitech Bridge plan to adapt its service to clients in regards to changing regulatory regimes in major market areas? You know, I cannot say that we're going to really change the services we're offering because of some new rules or regulations or something like this. Because, of course, the industry's standards are changing, but basically, honestly speaking, technically, for ethical hacking, it doesn't really change much. It's more a question of how often we're going to do the audits. If all the NDAs will be different, all the administrative questions will be a little bit different and so on. But technically speaking, the standards don't really change a lot for us because, I mean, the job of ethical hacker is quite simple. The objective is to hack the customer in order to show him all his weaknesses, horribilities and so on. Now, ITU are hosting Telecom World 2013 in Bangkok in November, and you're one of the sponsors of the Cybersecurity Pavilion there. I'd like to ask you what you're going to be exhibiting there and what you hope will come from it and about your engagement with ITU impact? It's actually a very big question, so I'd like to split it probably to several different parts. Starting with what we're going to present at ITU Telecom 2013 is Bangkok. In Bangkok, will be our new product that is called ImmuneWeb. To make a short description of ImmuneWeb, it's a very simple, fast, relatively cheap solution to check if a site web application is secure or not. Just to tell you a little bit about web hacking, web application security and so on. According to our experience, what we're seeing on the market since I can say basically 2007, almost each big hack intrusion to companies involves somehow a hacking of a site of a web application or something like this. ImmuneWeb actually allows to any person in this company like CEO or even a CFO to order an assessment of his site completely online. It can be done from iPad, iPhone or something like this. It will be really simple. All these things like order, payment configuration is completely online. There is no long phone calls when you have to speak with a legal team of your company, with a legal team of the customer who are saying that in our India there is a comma and because of this comma we cannot move further and so on and so on. So everything is completely online and the assessment objective is to make ethical hacking of sites, a web application for SMBs, government and GEOs, something they can really easily do. Well, we look forward to seeing a high-tech bridge at ITU Telecom World 2013. And Ilya Koloshchenko, thank you very much indeed for being with us today. Thank you very much for your invitation.