Hack23 AB Premium Cybersecurity Consulting | Sweden's Only Public ISMS

Security excellence through radical transparency. Expert ISO 27001, GDPR/NIS2, and AWS security consulting in Sweden.

30+ years expertise • CISSP/CISM certified • ISO 27001 proven • Gothenburg-based

Explore Services View Public ISMS
📖 Learn More About Hack23 AB

At Hack23 AB, transparency operationalizes trust: every security control, risk assessment, and compliance decision is publicly documented through Sweden's only fully public ISMS, creating unprecedented credibility in cybersecurity consulting.

Founded in 2025 and based in Gothenburg, Sweden, we deliver expert security services across four integrated business lines:

1. Cybersecurity Consulting ISO 27001, GDPR, NIS2, AWS security architecture, DevSecOps integration
2. CIA Compliance Manager Automated CIA Triad assessments with NIST/ISO 27001/GDPR/HIPAA/SOC2 compliance mapping
3. Citizen Intelligence Agency Swedish parliamentary transparency and democratic accountability platform
4. Black Trigram Educational Korean martial arts game demonstrating security best practices

Led by James Pether Sörling (Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), AWS Security Specialty) with 30+ years of experience, Hack23 proves that security accelerates—rather than blocks—innovation when built on radical transparency.

OpenSSF Scorecard Deploy GitHub Hack23

🏆 Security & Quality Evidence

View our comprehensive security validation and quality metrics (15+ badges)

🔒 Security

🚀 Build Status

📋 Compliance

🏢 Company

🌟 Why Choose Hack23 AB?

Sweden's only cybersecurity consultancy with a fully public ISMS, demonstrating transparency and security excellence that accelerates innovation rather than hindering it.

Core Differentiators

🔓 Radical Transparency

Sweden's only fully public Information Security Management System (ISMS) with 93 ISO 27001 controls, redacted risk registers, and complete policy documentation openly available. See exactly how we implement security—no hidden practices, no security theater.

  • 70% public / 30% responsibly redacted documentation
  • Live security metrics via OpenSSF Scorecard
  • Transparent risk assessments and treatment tracking

🎯 Proven Expertise

30+ years of hands-on software development and security architecture experience, backed by industry-leading certifications and real-world enterprise implementations.

  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) certified security professional
  • AWS Security Specialty & Solutions Architect Pro
  • Led security programs at Stena AB, Polestar, WirelessCar, and other major enterprises

⚡ Security Accelerates Innovation

Security-enabled development that integrates seamlessly into DevSecOps workflows. We prove that proper security controls accelerate—not block—innovation and time-to-market.

  • SLSA Level 3 supply chain security implementations
  • Automated compliance validation & CI/CD integration
  • Zero-trust architectures with real-world performance

Practical Value

🛠️ Practical Solutions

No security theater—only implementable solutions tested in production. Our open-source projects demonstrate security best practices with measurable outcomes.

  • Open-source security tools used in production
  • Documented threat models & security architectures
  • Real-world AWS multi-region resilience patterns

📊 Measurable Outcomes

Data-driven security with quantifiable risk metrics, automated compliance tracking, and continuous improvement demonstrated through public documentation.

  • Quantitative risk assessment methodologies
  • Security KPIs aligned to business objectives
  • Automated compliance mapping (ISO/NIST/GDPR/NIS2)

🌍 Nordic Innovation Hub

Gothenburg-based cybersecurity expertise combining Swedish innovation culture with international enterprise experience across automotive, logistics, and technology sectors.

  • Remote or in-person consulting (Gothenburg)
  • English & Swedish service delivery
  • GDPR/NIS2 compliance for Nordic market

🛡️ Information Security Governance

Demonstrating security through transparency. Our public Information Security Management System (ISMS) shows how enterprise‑grade controls enable innovation, consulting delivery, and product development. Access the continuously improved documentation set and the governing Information Security Policy covering purpose, principles, roles, and our risk & compliance model.

📋 Public ISMS Repository

Living documentation: policies, redacted registers, resilience & secure development practices (~70% public / 30% responsibly redacted).

ISMS Public Repository

🔒 Information Security Policy

Core policy: purpose, scope, principles (Security by Design, Transparency, Continuous Improvement, Business Value), roles & document map.

Information Security Policy

🔑 Security Services

Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.

🏗️ Security Architecture & Strategy

Enterprise security frameworks, risk assessment, and governance aligned with business objectives.

  • Enterprise Security Architecture
  • Risk Assessment & Management
  • Security Strategy Development

☁️ Cloud Security & DevSecOps

AWS security assessment, Infrastructure as Code security, CI/CD integration.

  • Secure Cloud Solutions (AWS Advanced)
  • DevSecOps Integration
  • Container & Serverless Security

🔧 Secure Development & Compliance

SDLC security integration, ISO 27001, GDPR/NIS2 compliance, OSPO management.

  • CI/CD Security Integration
  • Regulatory Compliance (GDPR, NIS2, ISO 27001)
  • Open Source Security

🚀 Open Source Projects

Demonstrating security best practices through production applications

Black Trigram

🥋 Black Trigram

Precision combat simulator with 70 vital points system, 5 archetypes, and authentic Korean martial arts techniques.

CIA Compliance

🔐 CIA Compliance Manager

Security assessment platform with CIA Triad evaluation and compliance mapping to NIST, ISO 27001, GDPR, HIPAA, SOC2.

CIA Project

🔍 Citizen Intelligence Agency

Swedish political transparency OSINT platform with parliamentary monitoring and accountability metrics.

💼 CEO James Pether Sörling

Leadership & Expertise

Company Leadership & Security Expert

James Pether Sörling, CEO of Hack23 AB

CEO/Founder of Hack23 AB, James brings over 30 years of information technology experience, specializing in security architecture, cloud security, and compliance. Professional certifications include CISSP, CISM, AWS Security Specialty, and AWS Solutions Architect Professional.

🎯 Key Qualifications:

CISSP CISM AWS Security Specialty AWS Solutions Architect Pro

🏢 Recent Leadership Roles:

  • Jun 2025-Present: CEO / Founder, Hack23 AB
  • Oct 2024-Jul 2025: Application Security Officer, Stena AB
  • Mar 2022-Sep 2024: Information Security Officer, Polestar
  • Jan 2018-Mar 2022: Senior Security Architect, WirelessCar

Recent Professional Experience

Extensive leadership experience in enterprise security and cloud architecture across major organizations:

  • Jun 2025-Present: Chief Executive Officer, Hack23 AB - Swedish Innovation Hub Leadership, Game Development Strategy
  • Oct 2024-Jul 2025: Application Security Officer, Stena AB - Risk Assessment, Cloud Security, AI Governance
  • Mar 2022-Sep 2024: Information Security Officer, Polestar - ISMS Implementation, Security Compliance, OSPO Lead

Martial Arts Background

James has extensive experience in traditional Korean martial arts, bringing authentic knowledge to the Black Trigram project:

  • 1999: Black Belt Song Moo Kwan Korea - Traditional Taekwondo certification
  • 2024: 3rd Dan Kukkiwon - World Taekwondo Headquarters certification
  • 2015-2017: Taekwondo Instructor, Tor Taekwondo klub - Teaching children's classes
  • 2002-2003: Taekwondo Instructor, Haga Taekwondo club - Community instruction
  • 1994-1996: Taekwondo Instructor, Hworangi Taekwondo - Early teaching experience

Martial Arts Philosophy: This deep understanding of Korean martial arts traditions directly influences the authentic techniques, cultural respect, and educational value integrated into Black Trigram's combat system.

Career History

Enterprise Architecture Experience

Security architecture and consulting roles at leading technology companies:

  • Jan 2018-Mar 2022: Senior Security Architect, WirelessCar - Security Architecture, AWS Security, Secure Development
  • Jan 2018-Nov 2018: Consultant, Omegapoint - Security Architect role at WirelessCar
  • Mar 2017-Jan 2018: Consultant, Consid AB - Open Source Development, CI/CD, AWS
  • 2010-Mar 2017: Cloud Architect, Keypasco - Cloud Security Solutions, Multi-Tier Architecture

Key Achievements: Founded Hack23 AB in 2025, led Open Source Program Office at Polestar, implemented enterprise security architectures, spoke at Javaforum Göteborg, featured in Computer Sweden.

Software Development Background

Foundation experiences in software engineering and system development:

  • 2008-2009: Consultant, Redpill Linpro - Technical support and client assignments across Sweden, Norway, Denmark
  • 2007-2008: Consultant, Singlegrid (London) - Continuous integration and build management solutions
  • 2006-2007: System Developer, Sky (London) - J2EE projects using XP/Agile development
  • 2003-2005: J2EE Developer, Glu Mobile (London) - Mobile service products development
  • 2000-2002: Software Engineer, Volantis Systems (London) - Multi-channel server product design and implementation

Early Career & Military Service

Foundation experiences that shaped leadership and technical expertise:

  • 1999-2003: Unix Helpdesk/Teaching Assistant, Chalmers University of Technology - System administration and tutorial teaching
  • Jun-Aug 1999: Visual C++ Programmer, IETV AB - Production control system development
  • 1996-1997: NBC-Defence Group Leader, Swedish Armed Forces - Leadership and security responsibilities
  • 1993-1996: Founder, Equal Rites BBS - Early networking and system administration (Fidonet node 2:203/454)

🎤 Technical Talks & Presentations

🎙️ Javaforum Göteborg

Presentation on secure architecture patterns and best practices for enterprise Java applications.

▶️ Watch Presentation

🎙️ Shift Left Like A Boss

Security podcast guest appearance discussing DevSecOps practices and supply chain security.

🎧 Listen to Podcast

Press Coverage

Computer Sweden

This article highlights the innovative use of technology in revealing the activities of politicians. It features James Pether Sörling's work in leveraging data-driven insights to promote transparency in political processes.

Read Article

Riksdag och Departement

A Swedish publication that discusses the role of Citizen Intelligence Agency in monitoring politicians. It underscores James Pether Sörling's commitment to fostering accountability in politics through the strategic use of technology.

Read Article

National Democratic Institute

A comprehensive survey report that underscores the importance of parliamentary monitoring organizations in Sweden. It acknowledges James Pether Sörling's significant contributions to these organizations, reinforcing his commitment to strengthening democratic processes.

View Report

Past Projects

Sonar-CloudFormation-Plugin

SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards.

View All Badges

Quality & Security

CIA Dashboard

Political activity dashboard for Sweden, offering comprehensive visualizations of parliamentary activity and political performance metrics.

View Documentation

Frequently Asked Questions

Common questions about Hack23's cybersecurity services, public ISMS, and approach to security consulting.

What makes Hack23 different from other cybersecurity consultancies?

Hack23 AB operates Sweden's only fully public ISMS (Information Security Management System), with all policies, threat models, and security documentation available on GitHub. This radical transparency demonstrates our expertise while providing clients with proven, battle-tested frameworks. We combine 30+ years of hands-on experience with CISSP/CISM certifications and current practitioner status (Application Security Officer at Stena Group IT), ensuring practical, implementable security advice—not just theory.

How much does cybersecurity consulting cost in Sweden?

Cybersecurity consulting costs vary by engagement scope. Typical ranges: (1) Security Assessment: €5,000-€15,000 for 2-4 week comprehensive review; (2) ISO 27001 Implementation: €15,000-€30,000 for 3-6 month project; (3) DevSecOps Integration: €10,000-€25,000 for CI/CD security setup; (4) Hourly Consulting: €150-€250/hour for advisory services. We provide transparent pricing with no hidden fees. Contact us for a customized quote based on your organization's needs.

Do you work remotely or require on-site presence in Gothenburg?

We offer both remote and in-person cybersecurity consulting. Remote services are available globally via video conferencing, screen sharing, and collaborative documentation tools—ideal for distributed teams and cost-effective engagements. In-person consulting is available in Gothenburg, Sweden, for clients preferring face-to-face interaction, hands-on workshops, or sensitive discussions requiring physical presence. Hybrid models combining remote and occasional on-site visits work well for many clients.

What is a public ISMS and why does it matter?

A public ISMS (Information Security Management System) is an open, transparent framework where security policies, procedures, threat models, and risk assessments are publicly available—unlike traditional ISMSs kept confidential. Hack23's public ISMS on GitHub (https://github.com/Hack23/ISMS-PUBLIC) demonstrates our security expertise through actual implementation, not just claims. This transparency: (1) Proves we follow our own recommendations, (2) Allows prospects to evaluate our methodology before engagement, (3) Provides free templates and examples for the security community, (4) Demonstrates confidence in our security posture. It's security through transparency, not security through obscurity.

What certifications do Hack23 consultants have?

Hack23 consultants hold industry-recognized certifications: (1) CISSP (Certified Information Systems Security Professional) - global standard for security expertise, (2) CISM (Certified Information Security Manager) - management-focused security certification, (3) AWS Certified Security - Specialty - cloud security expertise, (4) AWS Certified Solutions Architect - Professional - infrastructure design. Beyond certifications, our team brings 30+ years of hands-on experience, current practitioner roles (Application Security Officer positions), and active open-source security contributions. We believe practical experience + continuous learning > certifications alone.

How long does an ISO 27001 implementation take?

ISO 27001 implementation typically takes 3-6 months for small-to-medium Swedish organizations (10-50 employees). Timeline breakdown: (1) Scoping & Gap Analysis: 2-4 weeks, (2) ISMS Design & Risk Assessment: 3-4 weeks, (3) Control Implementation: 8-12 weeks, (4) Internal Audit & Management Review: 2-3 weeks, (5) Certification Audit Preparation: 1-2 weeks. Larger organizations (50+ employees) may require 6-12 months. Factors affecting timeline: existing security maturity, resource availability, organizational complexity, and consultant involvement. Our public ISMS provides proven templates to accelerate implementation by 30-40%.

What industries do you serve?

Hack23 serves diverse industries with cybersecurity consulting: (1) Technology & SaaS companies - DevSecOps, cloud security, secure SDLC, (2) Financial Services - GDPR, PSD2, MAS cybersecurity compliance, (3) Healthcare & Pharmaceuticals - ISO 27001, GDPR, patient data protection, (4) Manufacturing & Industrial - OT security, supply chain risk, ISO 27001, (5) E-commerce & Retail - PCI DSS, data protection, fraud prevention, (6) Professional Services - client data security, compliance frameworks. Industry-agnostic security principles apply universally, with sector-specific regulatory knowledge where needed.

Can you help with GDPR and NIS2 compliance?

Yes, Hack23 provides comprehensive GDPR (General Data Protection Regulation) and NIS2 (Network and Information Security Directive 2) compliance consulting. GDPR services: data protection impact assessments (DPIA), privacy-by-design integration, consent management, data subject rights implementation, breach notification procedures. NIS2 services: essential/important entity classification, risk management frameworks, incident reporting procedures (24-hour notification), supply chain security, governance structure alignment. We integrate GDPR/NIS2 requirements into ISO 27001 implementations for unified compliance management. Practical, implementable solutions—not checkbox compliance.

What is your approach to DevSecOps?

Our DevSecOps approach: 'Security that enables, not blocks, innovation.' We integrate security into CI/CD pipelines without slowing development velocity. Key elements: (1) Automated Security Scanning: SAST/DAST/SCA tools in GitHub Actions/GitLab CI, (2) Infrastructure as Code Security: Terraform/CloudFormation scanning, policy-as-code, (3) Container Security: Image scanning, runtime protection, Kubernetes security policies, (4) Secret Management: HashiCorp Vault integration, no hardcoded credentials, (5) Security Gates: Non-blocking for low/medium findings, blocking for critical/high, (6) Developer Training: Security champions program, secure coding workshops. Result: faster, more secure releases with measurable risk reduction.

Do you provide security architecture reviews?

Yes, Hack23 conducts comprehensive security architecture reviews covering: (1) Cloud Architecture: AWS/Azure/GCP security assessment, IAM review, network segmentation, secure configuration, (2) Application Architecture: Threat modeling (STRIDE analysis), authentication/authorization design, data flow security, API security, (3) Infrastructure Architecture: Zero-trust principles, defense-in-depth, attack surface analysis, security monitoring, (4) Compliance Alignment: ISO 27001, NIST CSF, CIS Controls mapping. Deliverables: detailed security architecture document, threat model, prioritized remediation roadmap, and implementation guidance. Reviews typically take 2-4 weeks depending on complexity.

What is included in a security consultation?

A Hack23 security consultation includes: (1) Initial Assessment: 30-60 minute discovery call to understand your security needs, challenges, and objectives, (2) Gap Analysis: Review of current security posture against industry standards (ISO 27001, NIST, CIS), (3) Threat Landscape: Identification of relevant threats specific to your industry and technology stack, (4) Recommendations: Prioritized, actionable security improvements with cost/benefit analysis, (5) Roadmap: Implementation timeline with milestones and resource requirements, (6) Follow-Up: Written report with findings and next steps. Free initial consultations available for qualified prospects. No obligation to proceed.

How do I get started with Hack23?

Getting started is simple: (1) Contact Us: Email info@hack23.com, (2) Initial Call: 30-minute discovery call to discuss your security needs (free, no obligation), (3) Proposal: Custom proposal outlining scope, timeline, deliverables, and pricing, (4) Kickoff: Once approved, we begin with stakeholder interviews and documentation review, (5) Execution: Regular check-ins, transparent communication, and deliverable reviews throughout engagement. Typical response time: 24-48 hours for initial inquiry, 1 week for proposal delivery. Ready to improve your security posture? Reach out today.

🔍 Free Security Assessment Checklist

Download our comprehensive 95-point security assessment guide. Evaluate your organization's security posture across 7 critical domains: Architecture, Access Control, Data Protection, Network Security, Vulnerability Management, Incident Response, and Compliance.

Based on ISO 27001, NIST CSF, and CIS Controls • Used by Enterprise Security Teams

Get Your Free Checklist

📧 Get in Touch

Have a question about our services or want to discuss your security needs? We'd love to hear from you!

Ways to Contact Us