CEO/Founder Hack23 | Security & Open Source Expert | Cloud Security Specialist | Information Security Professional
Strong advocate for transparency in organizations, secure software development practices, and innovative open source solutions. Experienced security professional with over 30 years in information technology, specializing in security architecture, cloud security, and compliance. Prior roles including Application Security Officer at Stena, Information Security Officer at Polestar and Senior Security Architect at WirelessCar.
At Hack23 AB, we believe that true security comes through transparency and demonstrable practices. Our Information Security Management System (ISMS) is publicly available, showcasing our commitment to open security practices.
Our approach to cybersecurity consulting is built on a foundation of transparent practices:
- ๐ Open Documentation: Complete ISMS framework available for review
- ๐ Policy Transparency: Detailed security policies and procedures publicly accessible
- ๐ฏ Demonstrable Expertise: Our own security implementation serves as a live demonstration
- ๐ Continuous Improvement: Public documentation enables community feedback and enhancement
"Our commitment to transparency extends to our security practices - demonstrating that true security comes from robust processes, continuous improvement, and a culture where security considerations are integrated from the start."
โ James Pether Sรถrling, CEO/Founder
Swedish innovation hub specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting and solutions.
|
Realistic 2D precision combat simulator inspired by traditional Korean martial arts, focusing on precise anatomical targeting, authentic combat techniques, and detailed physics modeling. |
|
|
Security assessment platform for the CIA triad (Confidentiality, Integrity, Availability) with business impact analysis and compliance mapping to regulatory frameworks like NIS2, ISO 27001, and GDPR. |
|
Political transparency platform monitoring Swedish political activity with data-driven insights, analytics, dashboard visualizations, and accountability metrics. |
|
|
Enterprise-grade multi-region active/active architecture with near-zero recovery time, comprehensive DNS failover, and AWS Resilience Hub policy compliance for mission-critical workloads. |
|
|
SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards. |
|
|
Swedish Parliament Intelligence Platform monitoring political activity in Sweden's Riksdag with systematic transparency through real-time analysis and 50+ years of historical data (1971-2024). |
Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical, implementable security solutions.
| ๐ Availability | Remote or in-person (Gothenburg) |
| ๐ฐ Pricing | Contact for pricing |
| ๐ข Company | Hack23 AB (Org.nr 5595347807) |
| ๐ง Contact |
| Area | Services | Ideal for |
|---|---|---|
| ๐๏ธ Security Architecture & Strategy | Enterprise Security Architecture, Risk Assessment & Management, Security Strategy Development, Governance Framework Design | Organizations needing strategic security leadership and architectural guidance |
| โ๏ธ Cloud Security & DevSecOps | Secure Cloud Solutions (AWS), DevSecOps Integration, Infrastructure as Code Security, Container & Serverless Security | Development teams transitioning to cloud-native architectures with security focus |
| ๐ง Secure Development & Code Quality | Secure SDLC Implementation, CI/CD Security Integration, Code Quality & Security Analysis, Supply Chain Security (SLSA Level 3) | Development teams seeking to embed security without slowing innovation |
| Category | Services | Value |
|---|---|---|
| ๐ Compliance & Regulatory | GDPR, NIS2, ISO 27001 implementation, ISMS Design, AI Governance, Audit Preparation | Navigate complex regulatory landscapes with confidence |
| ๐ Open Source Security | OSPO establishment, Vulnerability Management, Security Tool Development, Community Engagement | Leverage open source securely while contributing to security transparency |
| ๐ Security Culture & Training | Security Awareness Programs, Developer Security Training, Leadership Briefings, Incident Response Training | Transform security from barrier to enabler through education and culture |
mindmap
root((๐ CIA Triad<br>Security Focus))
๐ Confidentiality
๐ท๏ธ Data Classification
๐ Public
๐ก๏ธ Restricted
๐๏ธ Confidential
๐ Secret
๐ช Access Control
๐ฅ RBAC Implementation
๐ MFA Integration
๐ Least Privilege
๐ Encryption
๐งฌ AES-256
๐งฟ Quantum-Safe Encryption
๐๏ธ KMS Integration
โ๏ธ Integrity
๐งช Data Validation
๐๏ธ Manual Checks
๐ค Automated Validation
๐ Blockchain Records
๐ Change Control
๐ Audit Trails
โป๏ธ Versioning
๐ก๏ธ Non-Repudiation
๐ Quality Assurance
๐งโ๐ป Code Analysis
๐งฉ Test Coverage
๐
SLSA Level 3
โฐ Availability
๐ก๏ธ Resilience Levels
๐พ Backup/Restore
๐ฅ Pilot Light
โจ๏ธ Warm Standby
๐ Multi-Site Active/Active
๐ Recovery Metrics
๐ RTO Targets
โณ RPO Objectives
๐ Uptime SLAs
๐ Monitoring
โค๏ธ Health Checks
๐จ Alerting
๐ฅ Chaos Testing
|
Featured article on innovative use of technology for political transparency Read Article |
Coverage on Citizen Intelligence Agency's monitoring capabilities Read Article |
Recognized in survey of parliamentary monitoring organizations View Report |
Eric Erfors credits Citizen Intelligence Agency for exposing politician voting attendance records Read Article |
Explore information security, ISMS policies, and cybersecurity best practices through the unique Discordian lens inspired by the Illuminatus! trilogy. "Think for yourself, question authority."
Featured Content:
- ๐ญ Discordian Manifesto - Everything You Know About Security Is a Lie
- ๐ Complete ISMS Coverage - All 30 posts link directly to ISMS-PUBLIC repository
- ๐ Illuminatus! Style - FNORD detection, Chapel Perilous references, 23 FNORD 5 signatures
All hail Eris! All hail Discordia! ๐
mindmap
root((๐จโ๐ผ James Pether Sรถrling))
๐ Information & Security Leadership
๐จโ๐ผ CISO / ISO Roles
๐ก๏ธ Security Architecture
๐งฉ CIA Triad Implementation
๐ ๏ธ Policy Development & Governance
๐ Risk Management
๐ Audit & Compliance Oversight
๐ค AI Governance
๐ Open Source Program Office
๐๏ธ Frameworks & Compliance
๐ ISO 27001
๐ NIST 800-53
๐ VDA-ISA
๐ CIS Controls
๐ท๏ธ Data Protection / GDPR
๐ ISMS Implementation
๐งช Continuous Improvement
โ๏ธ Cloud & Platform Security
๐ Multi-Cloud (AWS / Azure)
๐๏ธ Enterprise & Reference Architectures
๐ Secure Cloud Services
๐งฑ Network & VPC Security
๐ IAM / Least Privilege
๐ ๏ธ Infrastructure as Code
๐งพ CloudFormation
๐ ๏ธ Terraform
๐ GitOps / Pipelines
๐ฆ Supply Chain (SLSA Level 3)
๐ป Software Engineering
โ Java / Spring
โ๏ธ React / TypeScript
๐ PostgreSQL
๐ CI/CD Automation
๐งต Secure SDLC (SSDLC)
๐ Code Quality (SonarQube)
๐ฌ Security Operations & Assurance
๐จ Incident Response
๐ต๏ธ Vulnerability Management
๐ Security Monitoring
๐งช Threat Modeling
๐ Open Source Leadership
๐ CIA Compliance Manager
๐๏ธ Citizen Intelligence Agency
๐งฉ Sonar-CloudFormation-Plugin
๐ง cfn-nag Contributions
๐ค Community Engagement
๐ Certifications & Recognition
๐ CISSP
๐ CISM
๐ฅ AWS Security Specialty
๐ฅ AWS Solutions Architect Professional
๐ก๏ธ SLSA Level 3 Attestations
๐ Strategic Impact
๐ Transparency Advocacy
๐งญ Security-by-Design Enablement
๐ง Knowledge Sharing / Speaking
๐ข Public Policy & Civic Tech
Experienced technology professional specializing in information security and delivery of secure cloud systems. Strong advocate for transparency in organizations and committed to ensuring robust security through open practices.
%%{init: {'theme': 'base', 'themeVariables': { 'primaryColor': '#d1c4e9', 'primaryTextColor': '#1a1a1a', 'primaryBorderColor': '#9575cd', 'lineColor': '#9575cd', 'secondaryColor': '#bbdefb', 'tertiaryColor': '#c8e6c9'}}}%%
timeline
title Professional Journey
section Enterprise Security
2024 : Application Security Officer, Stena Group IT
: Risk Assessment, Cloud Security, Microsoft Azure, AI Governance
2022 - 2024 : Information Security Officer, Polestar
: ISMS Implementation, Security Compliance, Risk Management, OSPO Lead
2018 - 2022 : Senior Security Architect, WirelessCar
: Security Architecture, AWS Security, Secure Development Practices
section Cloud & Security Engineering
2017 - 2018 : Consultant, Consid AB
: Open Source Development, CI/CD, Docker, AWS
2010 - 2017 : Cloud Architect, Keypasco
: Cloud Security Solutions, Multi-Tier Architecture, AWS Infrastructure
section Software Development
2008 - 2009 : Consultant, Redpill Linpro
: Technical Support, System Administration, Development
2006 - 2007 : System Developer, Sky
: J2EE Projects, Agile Development, Test-Driven Development
2003 - 2005 : J2EE Developer, Glu Mobile
: Mobile Services, Integration
2000 - 2002 : Software Engineer, Volantis Systems
: Multi-Channel Server Product Development
- Information Security Officer at Polestar, leading security practices and the Open Source Program Office
- Senior Security Architect at WirelessCar, supporting secure delivery practices and security risk management
- Open source contributor for cfn-nag, developing integration with SonarQube for CloudFormation security analysis
- Speaker at Javaforum Gรถteborg on secure architecture patterns
- Guest on Shift Left Like A Boss security podcast
- Featured in Computer Sweden and Riksdag och Departement for political transparency work
- Mentioned in National Democratic Institute survey on parliamentary monitoring organizations
- Operated Equal Rites BBS in the 1990s, part of Fidonet (Node 2:203/454)
Hack23.com is a static, multi-language HTML/CSS site deployed to AWS S3 + CloudFront.
For the authoritative, always up-to-date sitemap, use the live page:
- ๐ Live Sitemap: https://hack23.com/sitemap.html
- ๐ Homepage: https://hack23.com/index.html
- ๐งญ Why Hack23?: https://hack23.com/why-hack23.html
- ๐ CIA Triad FAQ: https://hack23.com/cia-triad-faq.html
- ๐ All Services: https://hack23.com/services.html
- ๐งพ Security Assessment Checklist: https://hack23.com/security-assessment-checklist.html
- ๐ฎ Black Trigram: https://hack23.com/black-trigram.html
- ๐๏ธ Citizen Intelligence Agency: https://hack23.com/cia-project.html
- ๐ CIA Compliance Manager: https://hack23.com/compliance-manager.html
- ๐ฌ๐ง English: https://hack23.com/sitemap.html
- ๐ธ๐ช Swedish: https://hack23.com/sitemap_sv.html
- ๐ฐ๐ท Korean: https://hack23.com/sitemap_ko.html
- ๐ณ๐ฑ Dutch: https://hack23.com/sitemap_nl.html
- ๐ฉ๐ช German: https://hack23.com/sitemap_de.html
- ๐ซ๐ท French: https://hack23.com/sitemap_fr.html
- ๐ฏ๐ต Japanese: https://hack23.com/sitemap_ja.html
- ๐จ๐ณ Chinese: https://hack23.com/sitemap_zh.html
- ๐บ๏ธ XML Sitemap: https://hack23.com/sitemap.xml
- ๐ค robots.txt: https://hack23.com/robots.txt
- ๐ Public ISMS: https://github.com/Hack23/ISMS-PUBLIC
- ๐ฅ๏ธ Homepage Source: https://github.com/Hack23/homepage







