Christoffer Prokic Founder and CEO of Cybertrigo

Christoffer Prokic has long experience of cybersecurity and are one of Europe's foremost experts in cybersecurity. He has worked as an independent information consultant and is today the founder of the computer security company Cybertrigo and has a well-established experience of that handle various types of cyber attacks that involve Web application vulnerabilities, the operating system vulnerabilities and malware. His expertise includes malware in embedded systems, malicious software, vulnerability research, and Windows programming. He has published several blog articles related to malicious code and cyber security and is passionate about exploring new technologies such as military cryptography, crypto virology and big data intelligence. He is a member of organizations such as IEEE, Isaca & Defcon.

In 2015, Christoffer founded the Cybertrigo to provide cybersecurity with research experience in web application security and cybersecurity defence strategy.

Trigo B7000 Advanced Cyber Intelligence Threat Bot


Trigo B7000

Enhance your existing security controls and improve forensic capabilities with our up-to-the-minute and immediately actionable advanced cyberthreat data.

Trigo B6000 Advanced Cyber Proactive Mitigation Bot


Trigo B6000

Timely identification of security incidents mitigates their impact before it becomes apparent and protects your resources from similar attacks in future.

The VICE core fundamental of Cybertrigo


Is weakness in a system, either by design, configuration, or process, that renders it open to exploitation by a given threat or susceptible to a given hazard. A system is said to be vulnerable when it provides the opportunity for a threat to break a security attribute it is meant to maintain. Vulnerabilities are caused by mistakes and our fallible ability to design secure systems. System is also used in the broadest sense of the word, a user is part of the system and therefore introduces vulnerabilities. Policies, data artifacts, and humans can all have vulnerabilities that adversaries can take advantage of, do not fixate on just software, network, or hardware vulnerabilities.


Integrity relates to only allowing authorized users to modify data in cyber space. When data is exchanged between actors in cyber space, it often passes through shared areas where other actors have the ability to modify data before it reaches its recipient. Therefore, a critical concept of cyber security is that some data is critical and must remain unchanged between sender and receiver.


Actors within cyber space are projections of physical objects, either people or systems. To enable decisions on who and what is allowed access to resources, it is critical to have the ability to authenticate actors within cyber space to their physical reality with some level of assurance. Connectability applies to actions and data within cyber space; that is, you authenticate actions and data as having come from a user.


An instance of a method designed to take advantage of a vulnerability in a system to breach its security is an exploit. An exploit is the realization of a vulnerability. While there can be many vulnerabilities in a system, there isn’t an exploit until a threat actor develops a tool or method to take advantage of the vulnerability to subvert a system’s security.

Cyber Technolgies

Cybertrigo is also privileged to access a business ecosystem.

cybertrigo logo