About us

shutterstock_1197153475_edited.jpg

we are 

falcon guard

At Falcon Guard, we’re on a permanent mission to discover advanced cyber adversaries no matter where they hide. We provide reliable detection of cyber threats and timely response to cyberattacks to minimize their impact on businesses in any industry. Using our proprietary Machine Learning-powered platform and hunt algorithms, we can detect attack traces hidden within Terabytes of security logs. The bad guys are already in and we can show you where.

FALCON GUARD

meet THE team

Leonardo M. Falcon
CEO & Cybersecurity Consultant
  • LinkedIn - Bílý kruh
ezgif.com-gif-maker.jpg

Leonardo is a recognized expert and leader in the field of cybersecurity. He has a diverse background in cybersecurity, with a mix of industry-specific and entrepreneurial experience. Over the years Leonardo has developed deep expertise in SOC operations, Incident Response, Digital Forensics, and Threat Hunting. He has built a cyber threat detection and response team which comprises of highly specialized cybersecurity professionals. He is also experienced leading the delivery of complex cybersecurity projects globally and helps clients to develop capabilities to detect and respond to advanced cyber attacks. He's passionate about discovering hidden attacks and adversaries through Machine Learning and other Threat Hunt methodologies.

Jakub Cudka
Cybersecurity Consultant
Jakub_Cudka_photo.jpg

Jakub graduated from Czech Technical University in Prague in the field of Information Security. His university studies covered the foundation of diverse branches of Cybersecurity. He developed a proof of concept for exploitation of graphical and hardware interfaces as part of his thesis for Master degree. This work included the investigation of detection methods for the relevant attack techniques. Jakub continued to gain more experience in Incident Response, Digital forensics and Threat Hunting during his studies and after his graduation. He has also experience with the development of Cybersecurity tools and he enjoys exploring the internals of diferent operating systems and researching techniques leveraged by advanced cyber attackers.