MottaSec

MottaSec

Speciality: SCADA/OT Penetration Testing

Dafni, Greece 5 employees
[01] About

Cybersecurity firm specializing in penetration testing, cybersecurity consulting, and bespoke security solutions; founded in 2022, with 2 employees and +150% YoY growth; based in Dafni, Greece, with expertise in ICS/OT pentesting, red/purple teaming, and ISO 27001.

We are a boutique cyber security firm with serious experience in the service of leading global organizations, civil and military, as well as corporations. Our multidisciplinary team of cyber security experts work by your side as strategic partners, effectively combining deep knowledge with a wide breadth of technologies, platforms, components and vendors to deliver unique, complex, sophisticated and 100% tailored cyber security frameworks, capable of preventing threats and defending the value and reputation of your business. ------------- Twitter: /mottasec_ Facebook: /MottaSec1 Instagram: /mottasec ------------- ✉ info@mottasec.com
[02] Services
[03] Certifications
GDPR

GDPR Certification Overview


Origin


The General Data Protection Regulation (GDPR) was created by the European Union and came into effect on May 25, 2018. It was developed by the European Parliament and Council to modernize and unify data protection laws across all EU member states. The regulation was created in response to the rapid growth of digital technology and data processing, aiming to give individuals greater control over their personal data while establishing clear obligations for organizations that collect, store, and process such information.


Industry Value


GDPR compliance is highly valued in the industry because it demonstrates an organization's commitment to data privacy and security, which has become a critical business concern globally. Organizations with GDPR expertise can avoid substantial fines (up to €20 million or 4% of annual global turnover), maintain customer trust, and gain competitive advantages when doing business with European entities or handling EU citizens' data. Professionals with GDPR certification are in high demand as companies worldwide seek to ensure compliance, implement proper data protection frameworks, and avoid the legal, financial, and reputational risks associated with data breaches and non-compliance.

NIS2

NIS2 Directive Overview


Origin and Background


The NIS2 Directive (Network and Information Security Directive 2) was created by the European Union and adopted in January 2023, replacing the original NIS Directive from 2016. The European Parliament and Council developed this legislation to address the growing cybersecurity threats across member states and to create a more uniform approach to cybersecurity requirements. It was implemented because the original directive had inconsistent application across EU countries and didn't adequately cover the expanding digital landscape and supply chain vulnerabilities that emerged in recent years.


Industry Importance and Value


NIS2 is significant because it establishes mandatory cybersecurity requirements for approximately 160,000 organizations across essential and important sectors in the EU, including energy, healthcare, banking, digital infrastructure, and public administration. The directive is valued for creating harmonized cybersecurity standards across Europe, improving incident reporting mechanisms, and holding senior management directly accountable for compliance. For organizations doing business in or with the EU, NIS2 compliance has become essential—not only to avoid substantial penalties (up to €10 million or 2% of global turnover) but also to demonstrate robust cybersecurity practices to partners and customers in an increasingly interconnected global market.

IEC 62443
OSCP

Origin of the OSCP


The Offensive Security Certified Professional (OSCP) certification was created by Offensive Security, a company founded by Mati Aharoni and other security professionals in 2007. The certification was developed to address the gap between theoretical knowledge and practical penetration testing skills in the cybersecurity industry. Offensive Security designed the OSCP to be a hands-on, performance-based certification that requires candidates to demonstrate actual hacking skills in a controlled lab environment rather than simply answering multiple-choice questions.


Industry Value and Importance


The OSCP is highly valued in the cybersecurity industry because it proves that holders possess real-world penetration testing abilities. Unlike traditional certifications, the OSCP's 24-hour practical exam requires candidates to successfully compromise multiple machines in a simulated network environment and document their findings professionally. This hands-on approach has made it a gold standard for entry to intermediate-level penetration testers, and it's frequently requested or required by employers hiring for offensive security roles. The certification's difficulty and practical nature have earned it significant respect among security professionals and hiring managers.

OSEP

OSEP Cybersecurity Certification


The Offensive Security Experienced Penetration Tester (OSEP) certification was created by Offensive Security, the same organization behind the renowned OSCP certification. Launched in 2020, the OSEP was developed to address the growing need for advanced penetration testing skills that go beyond basic exploitation. The certification was designed to validate professionals' abilities to conduct sophisticated attacks against modern enterprises, including evading security controls, bypassing defenses, and operating in restricted environments.


The OSEP is highly valued in the cybersecurity industry because it demonstrates hands-on expertise in advanced penetration testing techniques used in real-world scenarios. Unlike many theoretical certifications, it requires candidates to complete a challenging 48-hour practical exam where they must compromise multiple targets in a simulated corporate environment. Employers recognize OSEP holders as having proven capabilities in offensive security operations, making it particularly valuable for penetration testers, red team operators, and security consultants who need to demonstrate their ability to identify and exploit complex vulnerabilities in enterprise networks.

OSED
CREST

CREST Cybersecurity Certification


Origin


CREST (Council of Registered Ethical Security Testers) was established in 2006 in the United Kingdom by a group of cybersecurity professionals and industry representatives. It was created to address the growing need for standardized, recognized qualifications in penetration testing and cybersecurity services. The organization emerged from concerns about the quality and professionalism of security testing services, aiming to provide a framework that would certify both individual practitioners and the companies that employ them.


Industry Value


CREST certifications are highly valued in the cybersecurity industry because they demonstrate a practitioner's technical competence and adherence to professional ethical standards. Many government agencies, financial institutions, and large corporations specifically require CREST-certified professionals when procuring penetration testing or security assessment services. The certification provides assurance to employers and clients that certified individuals have been independently verified to possess the necessary skills and knowledge, and that they follow established codes of conduct. This makes CREST credentials particularly important for cybersecurity professionals working in regulated industries or seeking to work with organizations that have stringent security requirements.

GXPN

GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)


The GXPN certification was created by the Global Information Assurance Certification (GIAC), which is part of the SANS Institute, a leading organization in cybersecurity training and certification. Introduced in 2011, the GXPN was developed to validate advanced penetration testing skills and the ability to conduct sophisticated security assessments. It was designed to address the growing need for professionals who could go beyond basic vulnerability assessments and perform complex exploit development and advanced attack simulations.


The GXPN is highly valued in the cybersecurity industry because it demonstrates expertise in advanced exploitation techniques, including reverse engineering, exploit development, and sophisticated penetration testing methodologies. This certification is particularly respected among offensive security professionals, red teams, and organizations that require rigorous security testing of their systems. Holding a GXPN credential signals to employers that a professional possesses the technical depth to identify complex vulnerabilities and can think like an advanced adversary, making it one of the more prestigious certifications for senior-level penetration testers and security researchers.

GICSP
ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

[05] Notable Clients
  • Notable clients are not explicitly named in the available public sources or the company's website content. The company references working with a leading Greek food production company
  • an industrial manufacturing facility
  • and a Greek defense technology company
  • but no specific client names are disclosed.